Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Law

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …


The New Global Financial Landscape: Why Egregious International Corporate Fraud Should Be Cognizable Under The Alien Tort Claims Act, Joel Slawotsky Oct 2006

The New Global Financial Landscape: Why Egregious International Corporate Fraud Should Be Cognizable Under The Alien Tort Claims Act, Joel Slawotsky

Duke Journal of Comparative & International Law

No abstract provided.


Conscripting Attorneys To Battle Corporate Fraud Without Shields Or Armor? Reconsidering Retaliatory Discharge In Light Of Sarbanes-Oxley, Kim T. Vu Oct 2006

Conscripting Attorneys To Battle Corporate Fraud Without Shields Or Armor? Reconsidering Retaliatory Discharge In Light Of Sarbanes-Oxley, Kim T. Vu

Michigan Law Review

This Note advocates that federal courts should allow attorneys to bring retaliatory discharge claims under SOX. Traditional rationales prohibiting the claims of retaliatory discharge by attorneys do not apply in the context of Sarbanes-Oxley. This Note contends that the Department of Labor and the federal courts should interpret the whistleblower provisions of § 806 as protecting attorneys who report under § 307. Assuring reporting attorneys that they have protection from retaliation will encourage them to whistleblow and thereby advance SOX's policy goal of ferreting out corporate fraud. Part I explores the legal landscape of retaliatory discharge suits by attorneys. This …


Slack V. James: Can South Carolina's Real Estate Industry Rely On Non-Reliance Clauses, Morgan H. Rogers Apr 2006

Slack V. James: Can South Carolina's Real Estate Industry Rely On Non-Reliance Clauses, Morgan H. Rogers

South Carolina Law Review

No abstract provided.


The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox Jan 2006

The Role Of Power And Negotiation In Online Deception, Chad Albrecht, Conan C. Albrecht, Jonathan Wareham, Paul Fox

Journal of Digital Forensics, Security and Law

The purpose of this paper is to advance theoretical understanding of the important role of both power and negotiation during online deception. By so doing, the paper provides insight into the relationship between perpetrator and victim in Internet fraud. The growing prevalence of Internet Fraud continues to be a burden to both society and individuals. In an attempt to better understand Internet fraud and online deception, this article attempts to build an interactive model, based upon the dimensions of power and negotiation from the management and psychology literature. Using the model presented, the article examines the effects of the Internet …


Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan Jan 2006

Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan

Journal of Digital Forensics, Security and Law

Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …


Counseling Organizational Clients"Within The Bounds Of The Law", Roger C. Cramton Jan 2006

Counseling Organizational Clients"Within The Bounds Of The Law", Roger C. Cramton

Hofstra Law Review

No abstract provided.


A Double Standard For Lawyer Dishonesty: Billing Fraud Versus Misappropriation, Lisa G. Lerman Jan 2006

A Double Standard For Lawyer Dishonesty: Billing Fraud Versus Misappropriation, Lisa G. Lerman

Hofstra Law Review

No abstract provided.


Choice And Fraud In Racial Identification: The Dilemma Of Policing Race In Affirmative Action, The Census, And A Color-Blind Society, Tseming Yang Jan 2006

Choice And Fraud In Racial Identification: The Dilemma Of Policing Race In Affirmative Action, The Census, And A Color-Blind Society, Tseming Yang

Michigan Journal of Race and Law

This Article focuses on the implications of self-conscious efforts by individuals to alter their racial identity and the challenge that they pose to social conventions and the law. It also considers some implications of such a framework to the promotion of a color-blind society, in particular with respect to health care services and bureaucratic records.