Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

PDF

Conference

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 210

Full-Text Articles in Law

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore Apr 2024

Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …


High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia Feb 2024

High Times, Higher Stakes: Mental Health Impacts In New Recreational Marijuana Legal Landscape, Jason T. Lorenzon J.D., Chris Pezalla, Diana Semilia

National Training Aircraft Symposium (NTAS)

This presentation delves into the societal and mental health consequences arising from the increasing trend of legalizing recreational marijuana. Specifically, we will examine the potential normalization of unconventional behavior among aviation college students, who may grapple with substance use challenges due to stress, sleep difficulties, and the demands of college life. Given the rigorous nature of flight training, prioritizing the mental well-being of pilots becomes imperative.

With the recent legalization of recreational marijuana in Ohio, this presentation integrates insights from Diana Semilia's 2022 study on Kent State Flight Students Ages 19-26. The study's objective was to extract practical recommendations applicable …


Limitation For Liberty, Riley Banker May 2023

Limitation For Liberty, Riley Banker

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper examines how the foundational principals of life, liberty, and the pursuit of happiness are under attack in our nation today and demonstrates why protecting them through Federalism is so important.


Examining The Effects Of Student Loan Forgiveness And The Christian Perspective, Sarah Rogers May 2023

Examining The Effects Of Student Loan Forgiveness And The Christian Perspective, Sarah Rogers

Helm's School of Government Conference - American Revival: Citizenship & Virtue

On August 24, 2022, President Joe Biden announced his plan for federal student loan forgiveness. The program allows individuals who make less than $125,000 a year and families under $250,000 relieve up to $10,000 of their loan debt. Those who fall under the Pell Grant program are able to relieve up to $20,000 of their debt. The reactions to this “revolutionary” program were mixed. Typically, those who the program would directly affect were very enthusiastic about this idea while those, most notably Republicans, were less than thrilled. While the idea is good in theory, the execution of debt forgiveness will …


The American Debate Between Toleration And Liberty Of Conscience, Zachary Federico May 2023

The American Debate Between Toleration And Liberty Of Conscience, Zachary Federico

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Creating A New Sports Division The Importance Of Protecting Women’S Sports While Encouraging Sportsmanlike Competition, Taylor Nilson May 2023

Creating A New Sports Division The Importance Of Protecting Women’S Sports While Encouraging Sportsmanlike Competition, Taylor Nilson

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Creating a new sports division: The importance of protecting women’s sports while encouraging sportsmanlike competition

The foundation of sports is to encourage respectful and fair competition between two or more individuals. For those who choose to participate, they are pursuing the happiness they find in competition, others have found their livelihood in sports, and most find liberty in their carefree activities.

Given the recent rise in the popularity of the transgender community, it is natural for members that want to compete in sports, specifically women’s sports. However, with that there are also those who would abuse this popularity to support …


Gbsv Resource Guide And Review For The University Of Western Ontario And Surrounding Area, Alyssa J. Madhani Aug 2022

Gbsv Resource Guide And Review For The University Of Western Ontario And Surrounding Area, Alyssa J. Madhani

Undergraduate Student Research Internships Conference

During the 2021-2022 academic year, gender-based violence and sexual assault became a major topic of discussion due to a number of troubling incidents throughout the year. One of the largest calls to action by the student body was for more resources and trainings. This paper compiles the resources and trainings that can be found on campus of the University of Western Ontario and in the surrounding areas into a cohesive list of major relevant sources. The goal of this paper is to amplify the many different programs already in place that can be added to the training cohorts or made …


A Qualitative Look Into Repair Practices, Jumana Labib Aug 2022

A Qualitative Look Into Repair Practices, Jumana Labib

Undergraduate Student Research Internships Conference

This research poster is based on a working research paper which moves beyond the traditional scope of repair and examines the Right to Repair movement from a smaller, more personal lens by detailing the 6 categorical impediments as dubbed by Dr. Alissa Centivany (design, law, economic/business strategy, material asymmetry, informational asymmetry, and social impediments) have continuously inhibited repair and affected repair practices, which has consequently had larger implications (environmental, economic, social, etc.) on ourselves, our objects, and our world. The poster builds upon my research from last year (see "The Right to Repair: (Re)building a better future"), this time pulling …


Improving The Mental Health Tale In The Criminal Justice System, Meredith Bernal Apr 2022

Improving The Mental Health Tale In The Criminal Justice System, Meredith Bernal

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


Deterioration Of The Tenth Amendment: Why Federalism’S Hierarchy Must Be Restored, Giana Depaul Apr 2022

Deterioration Of The Tenth Amendment: Why Federalism’S Hierarchy Must Be Restored, Giana Depaul

Helm's School of Government Conference - American Revival: Citizenship & Virtue

No abstract provided.


2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr. Jan 2022

2022 Mlk Keynote Address: Eddie Glaude Jr. Pre-Event Presentation, Center For Social Equity & Inclusion, Eddie Glaude Jr.

Martin Luther King, Jr. Series

One of the nation’s most prominent scholars, Eddie Glaude, Jr. is an author, political commentator, public intellectual and passionate educator who examines the complex dynamics of the American experience. His writings, including his most recent—the New York Times bestseller Begin Again: James Baldwin’s America and Its Urgent Lessons for our Own—take a wide look at Black communities, the difficulties of race in the United States and the challenges we face as a democracy.

In his writing and speaking, Glaude is an American critic in the tradition of James Baldwin and Ralph Waldo Emerson, confronting history and bringing our nation’s …


Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk Jan 2022

Anatomy Of An Internet Hijack And Interception Attack: A Global And Educational Perspective, Ben A. Scott, Michael N. Johnstone, Patryk Szewczyk

Annual ADFSL Conference on Digital Forensics, Security and Law

The Internet’s underlying vulnerable protocol infrastructure is a rich target for cyber crime, cyber espionage and cyber warfare operations. The stability and security of the Internet infrastructure are important to the function of global matters of state, critical infrastructure, global e-commerce and election systems. There are global approaches to tackle Internet security challenges that include governance, law, educational and technical perspectives. This paper reviews a number of approaches to these challenges, the increasingly surgical attacks that target the underlying vulnerable protocol infrastructure of the Internet, and the extant cyber security education curricula; we find the majority of predominant cyber security …


A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang Jan 2022

A Low-Cost Machine Learning Based Network Intrusion Detection System With Data Privacy Preservation, Jyoti Fakirah, Lauhim Mahfuz Zishan, Roshni Mooruth, Michael L. Johnstone, Wencheng Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

Network intrusion is a well-studied area of cyber security. Current machine learning-based network intrusion detection systems (NIDSs) monitor network data and the patterns within those data but at the cost of presenting significant issues in terms of privacy violations which may threaten end-user privacy. Therefore, to mitigate risk and preserve a balance between security and privacy, it is imperative to protect user privacy with respect to intrusion data. Moreover, cost is a driver of a machine learning-based NIDS because such systems are increasingly being deployed on resource-limited edge devices. To solve these issues, in this paper we propose a NIDS …


Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik Jan 2022

Detection Of Overlapping Passive Manipulation Techniques In Image Forensics, Gianna S. Lint, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

With a growing number of images uploaded daily to social media sites, it is essential to understand if an image can be used to trace its origin. Forensic investigations are focusing on analyzing images that are uploaded to social media sites resulting in an emphasis on building and validating tools. There has been a strong focus on understanding active manipulation or tampering techniques and building tools for analysis. However, research on manipulation is often studied in a vacuum, involving only one technique at a time. Additionally, less focus has been placed on passive manipulation, which can occur by simply uploading …


Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd Jan 2022

Human-Controlled Fuzzing With Afl, Maxim Grishin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Fuzzing techniques are applied to reveal different types of bugs and vulnerabilities. American Fuzzy Lop (AFL) is a free most popular software fuzzer used by many other fuzzing frameworks. AFL supports autonomous mode of operation that uses the previous step output into the next step, as a result fuzzer spends a lot of time analyzing minor code sections. By making fuzzing process more focused and human controlled security expert can save time and find more bugs in less time. We designed a new module that can fuzz only the specified functions. As a result, the chosen ones will be inspected …


The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan Jan 2022

The Amorphous Nature Of Hackers: An Exploratory Study, Kento Yasuhara, Daniel Walnycky, Ibrahim Baggili, Ahmed Alhishwan

Annual ADFSL Conference on Digital Forensics, Security and Law

In this work, we aim to better understand outsider perspectives of the hacker community through a series of situation based survey questions. By doing this, we hope to gain insight into the overall reputation of hackers from participants in a wide range of technical and non-technical backgrounds. This is important to digital forensics since convicted hackers will be tried by people, each with their own perception of who hackers are. Do cyber crimes and national security issues negatively affect people’s perceptions of hackers? Does hacktivism and information warfare positively affect people’s perception of hackers? Do individual personality factors affect one’s …


Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik Jan 2022

Smart Home Forensics: Identifying Ddos Attack Patterns On Iot Devices, Samuel Ho, Hope Greeson, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Smart homes are becoming more common as more people integrate IoT devices into their home environment. As such, these devices have access to personal data on their homeowners’ networks. One of the advantages of IoT devices is that they are compact. However, this limits the incorporation of security measures in their hardware. Misconfigured IoT devices are commonly the target of malicious attacks. Additionally, distributed denial-of-service attacks are becoming more common due to applications and software that provides users with easy-to-use user interfaces. Since one vulnerable device is all an attacker needs to launch an attack on a network, in regards …


Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik Jan 2022

Digital Forensics For Mobility As A Service Platform: Analysis Of Uber Application On Iphone And Cloud, Nina Matulis, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Uber is a ride-hailing smartphone application (app) that allows users to order a ride in a highly efficient manner. The Uber app provides Mobility as a Service and allows users to easily order a ride in a private car with just a few clicks. Uber stores large amounts of data on both the mobile device the app is being used on, and in the cloud. Examples of this data include geolocation data, date/time, origin/destination addresses, departure/arrival times, and distance. Uber geolocation data has been previously researched to investigate the privacy of the Uber app; however, there is minimal research relating …


Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd Jan 2022

Microsoft Defender Will Be Defended: Memoryranger Prevents Blinding Windows Av, Denis Pogonin, Igor Korkin, Phd

Annual ADFSL Conference on Digital Forensics, Security and Law

Windows OS is facing a huge rise in kernel attacks. An overview of popular techniques that result in loading kernel drivers will be presented. One of the key targets of modern threats is disabling and blinding Microsoft Defender, a default Windows AV. The analysis of recent driver-based attacks will be given, the challenge is to block them. The survey of user- and kernel-level attacks on Microsoft Defender will be given. One of the recently published attackers’ techniques abuses Mandatory Integrity Control (MIC) and Security Reference Monitor (SRM) by modifying Integrity Level and Debug Privileges for the Microsoft Defender via syscalls. …


A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow Jan 2022

A Lightweight Reliably Quantified Deepfake Detection Approach, Tianyi Wang, Kam Pui Chow

Annual ADFSL Conference on Digital Forensics, Security and Law

Deepfake has brought huge threats to society such that everyone can become a potential victim. Current Deepfake detection approaches have unsatisfactory performance in either accuracy or efficiency. Meanwhile, most models are only evaluated on different benchmark test datasets with different accuracies, which could not imitate the real-life Deepfake unknown population. As Deepfake cases have already been raised and brought challenges at the court, it is disappointed that no existing work has studied the model reliability and attempted to make the detection model act as the evidence at the court. We propose a lightweight Deepfake detection deep learning approach using the …


Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha Jan 2022

Timestamp Estimation From Outdoor Scenes, Tawfiq Salem, Jisoo Hwang, Rafael Padilha

Annual ADFSL Conference on Digital Forensics, Security and Law

The increasing availability of smartphones allowed people to easily capture and share images on the internet. These images are often associated with metadata, including the image capture time (timestamp) and the location where the image was captured (geolocation). The metadata associated with images provides valuable information to better understand scenes and events presented in these images. The timestamp can be manipulated intentionally to provide false information to convey a twisted version of reality. Images with manipulated timestamps are often used as a cover-up for wrongdoing or broadcasting false claims and competing views on the internet. Estimating the time of capture …


A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen Jan 2022

A Culture Of Institutional Racism: Housing Policies During The New Deal, Breyonna J. Bowen

Capstone Showcase

There currently exists a distressed relationship between African Americans and housing due to previously enacted policies. In looking at this issue, I aim to use the theory of institutional racism to explain how past housing policies that enforce and perpetuate discrimination have impacted this current relationship. Through the method of policy analysis, I attempt to pinpoint where past housing policies have failed to provide housing to many African Americans. I find that there are several policies that were enacted during 1930s and 40s, specifically the New Deal Era, that inflicted discriminatory housing policies on African Americans. The findings indicate that …


The Right To Repair: (Re)Building A Better Future, Jumana Labib Aug 2021

The Right To Repair: (Re)Building A Better Future, Jumana Labib

Undergraduate Student Research Internships Conference

The goal of this research project was to take a multi-faceted, interdisciplinary approach to research and examine the Right to Repair movement’s progress, current repair practices, impediments, and imperatives, and the various large-scale implications (environmental, economic, social, etc.) stemming from diminished consumer freedom as a result of increased corporate greed and lack of governmental regulations with regards to repair and the environment. This poster exhibits the highlights of my general research project on the Right to Repair movement over the course of this four month internship, and aims to disseminate information about the movement to the wider public in an …


Coronavirus Communication: Interaction Of Church, State, And Constitution In The Pandemic Environment, Valeriia Manchak May 2021

Coronavirus Communication: Interaction Of Church, State, And Constitution In The Pandemic Environment, Valeriia Manchak

Helm's School of Government Conference - American Revival: Citizenship & Virtue

This paper investigates the response to Covid-19 by examining the communication problem between the government and religious institutions. During the outbreak, some faith-based organizations used religion-abetted value judgments which affected viral spread (Whitehead and Perry 2020). Religious institutions can also inspire people to be supportive while the world endures hard times. (Wildman, Bulbulia and et al. 2020). This paper will explain where churches have contributed to the challenges of dealing with the COVID virus and provide recommendations for the better response (Wildman, Bulbulia and et al. 2020). This paper also discusses where the government violated constitutional rights and how to …


The New Space Policy Regime And Its Financial Foundation, Tamara Campbell May 2021

The New Space Policy Regime And Its Financial Foundation, Tamara Campbell

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Post the global financial crisis of 2008, the National Aeronautical and Space Administration (NASA) sought to expand the space economy through a public policy of commercialization. This has brought major changes to the composition of space mission funding strategies, now repositioned as public private partnerships (P3s). Formed to fund space missions with private finance in lieu of public funding, P3s are investment and risk-sharing vehicles evaluated by financial intermediary institutions, insurers, and at times, the courts in the case where there is foreign direct investment (FDI) agreement. For this reason, it is arguable P3s have exceptional influence on the scope …


Child Welfare Service Worker's Perspective Of The Juvenile Justice System, Valorie Antone, Kathryn Whitehead, Alexander Comeau, Zoe Donvan Apr 2021

Child Welfare Service Worker's Perspective Of The Juvenile Justice System, Valorie Antone, Kathryn Whitehead, Alexander Comeau, Zoe Donvan

Thinking Matters Symposium

Prior literature indicates youth who have had adverse childhood events or are diagnosed with a mental illness are more likely to become involved in the juvenile justice system (Chappard & Maggard, 2020). While research has been performed to involve juvenile justice workers and juveniles that have been involved in the system, there has been little involvement by the child welfare workers who have followed the trajectory of the youth from the beginning of involvement. This study investigates the perceptions of child welfare workers regarding youth involvement in the criminal justice system, addressing a current gap in the literature. In terms …


Intersectionality And Accessibility To Social Services, Nora Khuder Apr 2021

Intersectionality And Accessibility To Social Services, Nora Khuder

Thinking Matters Symposium

In times of a crisis the intersectionality of sex, class, and ability creates a vulnerable population. Many available “resources'' are exhausted, due to high demand. Intersectionality signifies the impact of multiple intersecting identities in society as a direct correlation to the specific and unique barriers of marginalized groups. Resources are currently limited due to the lack of representative data. Although many studies have been conducted, many researchers have failed to capture the need of social services in rural areas.


The Future State Of Mobility, Jerome Quandt Mar 2020

The Future State Of Mobility, Jerome Quandt

Purdue Road School

Formed in 2018, the Illinois Autonomous Vehicles Association (ILAVA) is a privately funded non-for-profit organization focused on establishing thought leadership in the state of Illinois, by identifying and addressing the current and emerging opportunities related to the inevitable growth of CAV technologies throughout the transportation network. Through the deployment of scalable and sustainable business solutions, facilitating industry education and establishing thought leadership, ILAVA is creating an ecosystem that defines Illinois as #TheFutureStateofMobility.


Fiscal Citizenship: How Can Tax Efficiency And Isonomy Aid In The Promotion Of Economic Rights, Social Participation, Political Accountability, And Cultural Diversity?, Gustavo Voeroes Dénes Oct 2019

Fiscal Citizenship: How Can Tax Efficiency And Isonomy Aid In The Promotion Of Economic Rights, Social Participation, Political Accountability, And Cultural Diversity?, Gustavo Voeroes Dénes

Biennial Conference: The Social Practice of Human Rights

According to the World Inequality Report 2018 (WID 2017), Brazil is one of the few countries that has not recently displayed an increase in income inequality, having instead sustained it on persistently very high levels, actually composing the world’s “inequality frontier”. While such levels of inequality may be partly attributed to poor distribution of property rights, human capital endowments, and specificity of labor relations, a significant part of it is undoubtedly due the national fiscal system’s reduced distributive capacity, compromised by one the worst taxation systems in the world. Occupying the 184th position out of 190 countries in the World …