Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Sociology

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 9482

Full-Text Articles in Law

Highly Skilled Immigration In The United States In An Age Of Globalization: An Institutional And Agency Approach, Marcela F. González Sep 2018

Highly Skilled Immigration In The United States In An Age Of Globalization: An Institutional And Agency Approach, Marcela F. González

All Dissertations, Theses, and Capstone Projects

My dissertation proposes an institutional and agency approach in order to answer a new question to a new set of conditions, processes, and architecture of the new immigration trend for highly skilled immigration in the United States that emerged in the 1990s. The complexification of visa policies for highly skilled immigrants since the 1990s forces many immigrants to follow a multi-step legal pathway to acquire legal permanent residency: first, immigrants have a variety of temporary legal statuses or no legal status, and in a subsequent stage they achieve legal permanent residency. The central question that organizes the dissertation has two ...


Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta Jun 2018

Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta

Graduate Student Research Symposium

This paper discusses reconceptualizing racial discrimination under Title VII of the Civil Rights Act in light of modern social science theories on racial identity. Title VII prohibits employment discrimination on the basis of race, color, religion, sex, or national origin, and the judiciary calls these bases for discrimination “protected classes.” To bring a successful legal claim under Title VII, a person must demonstrate that she actually belongs to a protected class. In the case of a claim of racial discrimination, this means the plaintiff must belong to a racial group based on immutable characteristics, which are traits that cannot simply ...


List: Participants In The Campaign Techniques Workshop, National Women’S Education Fund. Jun 2018

List: Participants In The Campaign Techniques Workshop, National Women’S Education Fund.

Saffy Collection Textual

A participant list in the Campaign Techniques Workshop for the National Women's Education Fund held in Atlanta, Georgia. July 26-29, 1974. Box 28, Folder 1


Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran Jun 2018

Islamic Terrorism In The United States – The Association Of Religious Fundamentalism With Social Isolation & Paths Leading To Extreme Violence Through Processes Of Radicalization., Shay Shiran

Student Theses

This exploratory study focuses on identifying motivations for religious terrorism and Islamic terrorism in the United States in particular. Terrorism is a crime of extreme violence with the end purpose of political influence. This crime is challenging to encounter for its multi-faced characteristics, the unusual motivations of its actors, and their semi-militant conduct. The hypothesis of this study asserts that religious terrorists are radicalized by passing from fundamental to extreme devout agendas, caused by isolation from the dominant society, and resulted in high potential to impose those agendas by extreme violence. Under the theoretical framework of subculture in criminology, this ...


Bait Questions As Source Of Misinformation In Police Interviews: Does Race Or Age Of The Suspect Increase Jurors' Memory Errors?, Matilde Ascheri Jun 2018

Bait Questions As Source Of Misinformation In Police Interviews: Does Race Or Age Of The Suspect Increase Jurors' Memory Errors?, Matilde Ascheri

Student Theses

Bait questions—hypothetical questions about evidence, often used by detectives during interrogations—can activate the misinformation effect and alter jurors’ perceptions of the evidence of a case. Here, we were interested in investigating whether mock jurors’ implicit biases could amplify the magnitude of the misinformation effect. We accomplished this by manipulating the age and race of the suspect being interrogated. As an extension of Luke et al. (2017), we had participants read a police report describing evidence found at a crime scene, then read a transcript of a police interrogation where the detective used bait questions to introduce new evidence ...


Social Work Students’ Attitudes And Beliefs About Mental Health Courts, Nicholas Bettosini, Conrad Paul Akins-Johnson Jun 2018

Social Work Students’ Attitudes And Beliefs About Mental Health Courts, Nicholas Bettosini, Conrad Paul Akins-Johnson

Electronic Theses, Projects, and Dissertations

Mental Health Courts (MHCs) are a diversion program for mentally ill offenders in lieu of incarceration. The Substance Abuse and Mental Services Administration (SAMHSA) developed these specialized court programs in the 1990’s to assist mentally ill offenders in overcoming barriers to treatment. While new laws have begun to change the way mentally ill offenders are viewed from a law enforcement standpoint, social workers’ attitudes and beliefs about these programs have not been studied. This quantitative study’s purpose was to examine Master of Social Work (MSW) Graduate students’ attitudes and beliefs of mentally ill offenders and MHCs. Social work ...


Cold Genocide: Falun Gong In China, Maria Cheung, Torsten Trey, David Matas, Richard An Jun 2018

Cold Genocide: Falun Gong In China, Maria Cheung, Torsten Trey, David Matas, Richard An

Genocide Studies and Prevention: An International Journal

The article explores patterns of a cold genocide in the eradication campaign against Falun Gong. Falun Gong is a spiritual practice that has been targeted for eradication by the Chinese regime since 1999. In comparison to the documented cases of genocide, the genocide of Falun Gong stands out as anomalous because it is virtually ignored. The article seeks to elucidate the multi-faceted nature of this concealed genocide from an interdisciplinary perspective encompassing social work, medicine and law, In particular, the article demonstrates that the eradication campaign against Falun Gong is distinguishable as a cold genocide as it is: (1) multi-dimensional ...


The Rhetoric Is On The Wall: A Multimodal Study Of The U.S. – Mexico Border Through Image Narratives, Kristoffer Mason May 2018

The Rhetoric Is On The Wall: A Multimodal Study Of The U.S. – Mexico Border Through Image Narratives, Kristoffer Mason

Global Honors Theses

This paper applied social semiotics and systemic functional theory to study visual narratives related to President Trump’s border wall project and U.S. immigration policy. The images were selected by new articles posted by The New York Times using search parameters “border wall” and “undocumented immigration” between the dates of March 13 – April 13, 2018. Images were selected and categorized based on visual themes related to the border wall and policy enforcement. Of these categories, two images were selected for vertical perspective, vector patterns, and gestures to discover the narratives. Analysis of the images showed that social power and ...


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Regulation And The Marginalist Revolution, Herbert J. Hovenkamp May 2018

Regulation And The Marginalist Revolution, Herbert J. Hovenkamp

Faculty Scholarship

The marginalist revolution in economics became the foundation for the modern regulatory State with its “mixed” economy. Marginalism, whose development defines the boundary between classical political economy and neoclassical economics, completely overturned economists’ theory of value. It developed in the late nineteenth century in England, the Continent and the United States. For the classical political economists, value was a function of past averages. One good example is the wage-fund theory, which saw the optimal rate of wages as a function of the firm’s ability to save from previous profits. Another is the theory of corporate finance, which assessed a ...


A Brief Summary And Critique Of Criminal Liability Rules For Intoxicated Conduct, Paul H. Robinson May 2018

A Brief Summary And Critique Of Criminal Liability Rules For Intoxicated Conduct, Paul H. Robinson

Faculty Scholarship

This essay provides an overview of the legal issues relating to intoxication, including the effect of voluntary intoxication in imputing to an offender a required offense culpable state of mind that he may not actually have had at the time of the offense; the effect of involuntary intoxication in providing a defense by negating a required offense culpability element or by satisfying the conditions of a general excuse; the legal effect of alcoholism or addiction in rendering intoxication involuntary; and the limitation on using alcoholism or addiction in this way if the offender can be judged to be reasonably responsible ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Speech: An Authentic Theology, Desmond Tutu May 2018

Speech: An Authentic Theology, Desmond Tutu

Archbishop Desmond Tutu Collection Textual

Archbishop Tutu's writings on black theology. Typed with a few handwritten notes.


Personal Notes On A Sheraton Hotels And Resorts Notepad, Desmond Tutu May 2018

Personal Notes On A Sheraton Hotels And Resorts Notepad, Desmond Tutu

Archbishop Desmond Tutu Collection Textual

Archbishop Tutu's handwritten notes.


Speech: Madiba The Man, Desmond Tutu May 2018

Speech: Madiba The Man, Desmond Tutu

Archbishop Desmond Tutu Collection Textual

Archbishop Tutu’s speech about Nelson Mandela.


Due Process And The Right To Legal Counsel For Unaccompanied Minors, Marielos G. Ramos May 2018

Due Process And The Right To Legal Counsel For Unaccompanied Minors, Marielos G. Ramos

All Dissertations, Theses, and Capstone Projects

Unaccompanied minors arriving to the United States fleeing violence and seeking protection are apprehended, detained in facilities, and placed in removal proceedings in accordance with U.S. immigration laws. Like adults, these children have to appear in immigration court to fight deportation and must apply for any form of legal relief for which they may be eligible. However, removal proceedings work as a civil and not a criminal process, and immigration laws have established that while noncitizens have the right to an attorney, they are not entitled to legal counsel at the government’s expense. This thesis examines how the ...


Media Framing Of Wrongful Convictions, Eza B. Zakirova May 2018

Media Framing Of Wrongful Convictions, Eza B. Zakirova

Student Theses

Wrongful convictions are a major issue hindering the effectiveness and legitimacy of the criminal justice system. The topic has become a focus of media attention. Among the issues raised are the contributing factors to wrongful convictions, such as false confessions, false or misleading forensic evidence, official misconduct, mistaken witness identification, and perjury or false accusations. The following study examines how media frames these contributing factors of wrongful convictions using Loseke's social constructionist framework, which is useful for deconstructing the issue’s diagnostic, motivational and prognostic frames -- that is, how media consumers assess the causes, solutions, and the reasons to ...


Exploring Creative Problem Solving In Public Policy, Jade A. Costello May 2018

Exploring Creative Problem Solving In Public Policy, Jade A. Costello

Creative Studies Graduate Student Master's Projects

This project explores the connection between creativity and public policy-making through guided facilitation. In this exploration, there are several products that have been developed. The first is an index that provides definitions, charts, and process explanations for creativity, facilitation and public policy. The second is a completed facilitation plan that incorporates both the FourSight model for group facilitation (Miller, Vehar, Firestein, Thurber & Nielsen, 2011a) and Marvin Weisbord’s (1992) exploration of creative strategies for discovering common ground through policy conferences. The third product is an evaluation matrix, which would be used post-facilitation to understand the strengths and weaknesses from the ...


Thank-You Card: To Rodney Hurst From University Of North Florida Continuing Education. Circa 2010 Apr 2018

Thank-You Card: To Rodney Hurst From University Of North Florida Continuing Education. Circa 2010

Textual material from the Rodney Lawrence Hurst, Sr. Collection

No abstract provided.


Notes Of Support To Rodney Hurst From The Florida Humanities Council. Circa 2005-2010 Apr 2018

Notes Of Support To Rodney Hurst From The Florida Humanities Council. Circa 2005-2010

Textual material from the Rodney Lawrence Hurst, Sr. Collection

No abstract provided.


Membership Flyer: North Florida Abortion Rights Action League Apr 2018

Membership Flyer: North Florida Abortion Rights Action League

Saffy Collection Textual

Membership flyer from the North Florida Abortion Rights Action League. November-December, 1980. Volume 2, Edition 5. Box 25, Folder 11.


Balances Of Power Between Ip Creators: Ethical Issues In Scholarly Communication, Kristin Laughtin-Dunker Apr 2018

Balances Of Power Between Ip Creators: Ethical Issues In Scholarly Communication, Kristin Laughtin-Dunker

Library Presentations, Posters, and Videos

Scholarly communications often values free access above all else, but what happens when that drive for openness conflicts with ethical issues of consent and ownership? In this CARL IG Showcase panel, members of SCORE (Scholarly Communication and Open Resources for Education) will discuss some of the thorny issues of ethics and scholarly communication, including: consent (particularly among diverse communities outside of the institution) and digital collections, students as information creators / library as publisher, and decolonizing who we consider scholars and what we consider scholarship. This panel will feature speakers who will share current discussions and personal stories on issues pertinent ...


The Predictors Of Juvenile Recidivism: Testimonies Of Adult Students 18 Years And Older Exiting From Alternative Education, La Toshia Palmer Apr 2018

The Predictors Of Juvenile Recidivism: Testimonies Of Adult Students 18 Years And Older Exiting From Alternative Education, La Toshia Palmer

Dissertations

Purpose: The purpose of this descriptive, qualitative study was to identify and describe the importance of the predictors of juvenile recidivism and the effectiveness of efforts to prevent/avoid juvenile recidivism as perceived by previously detained, arrested, convicted, and/or incarcerated adult students 18 years of age and older exiting from alternative education in Northern California. A second purpose was to explore the types of support provided by alternative schools and the perceived importance of the support to avoid recidivism according to adult students 18 years of age and older exiting from alternative education.

Methodology: This qualitative, descriptive research design ...