Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- International Law (769)
- Intellectual Property Law (750)
- Constitutional Law (686)
- Criminal Law (418)
- Comparative and Foreign Law (377)
-
- Social and Behavioral Sciences (348)
- Environmental Law (313)
- Civil Rights and Discrimination (308)
- Arts and Humanities (277)
- Courts (277)
- Legislation (276)
- Law and Society (275)
- Human Rights Law (253)
- Health Law and Policy (240)
- State and Local Government Law (239)
- First Amendment (224)
- Criminal Procedure (219)
- Supreme Court of the United States (203)
- Science and Technology Law (187)
- Law and Economics (176)
- Jurisprudence (170)
- Labor and Employment Law (165)
- National Security Law (165)
- Legal Profession (161)
- Business Organizations Law (160)
- Public Affairs, Public Policy and Public Administration (160)
- Military, War, and Peace (159)
- Dispute Resolution and Arbitration (158)
- Entertainment, Arts, and Sports Law (156)
- Institution
-
- University of Georgia School of Law (591)
- Fordham Law School (360)
- St. John's University School of Law (323)
- Duke Law (185)
- University of Michigan Law School (177)
-
- Touro University Jacob D. Fuchsberg Law Center (174)
- University of Pennsylvania Carey Law School (171)
- William & Mary Law School (157)
- UC Law SF (155)
- Loyola University Chicago, School of Law (130)
- University of Richmond (127)
- Brooklyn Law School (126)
- Maurice A. Deane School of Law at Hofstra University (119)
- Seattle University School of Law (114)
- University of Washington School of Law (114)
- University of Oklahoma College of Law (111)
- The University of Akron (110)
- Case Western Reserve University School of Law (109)
- University of North Carolina School of Law (107)
- Vanderbilt University Law School (106)
- Maurer School of Law: Indiana University (105)
- University of Missouri School of Law (100)
- Washington and Lee University School of Law (94)
- American University Washington College of Law (93)
- Louisiana State University Law Center (90)
- Pepperdine University (87)
- Chicago-Kent College of Law (85)
- Southern Methodist University (85)
- University of Miami Law School (81)
- Notre Dame Law School (79)
- Keyword
-
- Copyright (120)
- Intellectual property (109)
- Supreme Court (78)
- Inc. (71)
- Law (70)
-
- First Amendment (64)
- Patent (59)
- Discrimination (53)
- New York (49)
- Arbitration (47)
- Constitutional law (45)
- Privacy (45)
- Education (43)
- Trademark (43)
- Constitution (42)
- Race (41)
- Legislation (40)
- Canada (38)
- Due process (37)
- Human rights (37)
- Fourth Amendment (35)
- United States (35)
- Jurisdiction (34)
- Lanham Act (34)
- Patents (34)
- Law reform (33)
- Tax (33)
- Internet (31)
- Patent law (31)
- Jurisprudence (30)
- Publication
-
- Journal of Intellectual Property Law (297)
- Georgia Journal of International & Comparative Law (256)
- The Catholic Lawyer (247)
- Fordham Urban Law Journal (170)
- Touro Law Review (156)
-
- Fordham Law Review (108)
- Akron Intellectual Property Journal (77)
- Florida Law Review (74)
- Water Law Review (63)
- Hofstra Law Review (58)
- Notre Dame Law Review (55)
- Seattle University Law Review (54)
- Mitchell Hamline Law Review (53)
- University of Richmond Law Review (51)
- Washington Law Review (51)
- The International Lawyer (50)
- Duke Law Journal (49)
- Georgia State University Law Review (49)
- Mercer Law Review (49)
- Missouri Law Review (49)
- Indiana Law Journal (48)
- Michigan Law Review (48)
- Tulsa Law Review (48)
- Law and Contemporary Problems (46)
- Louisiana Law Review (46)
- North Carolina Law Review (46)
- Oil and Gas, Natural Resources, and Energy Journal (46)
- Osgoode Hall Law Journal (46)
- Vanderbilt Law Review (46)
- Brooklyn Law Review (45)
Articles 1 - 30 of 7386
Full-Text Articles in Law
The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski
The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski
Touro Law Review
No abstract provided.
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah
Journal of Digital Forensics, Security and Law
With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom …
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler
Journal of Digital Forensics, Security and Law
The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash …
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh
Journal of Digital Forensics, Security and Law
The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any application; name, description, publisher …
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi
Journal of Digital Forensics, Security and Law
This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased …
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi
Journal of Digital Forensics, Security and Law
The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a distributed …
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler
Journal of Digital Forensics, Security and Law
A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun
Journal of Digital Forensics, Security and Law
Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent …
A Journey Through The Health Care Safety Net, Brietta R. Clark
A Journey Through The Health Care Safety Net, Brietta R. Clark
Saint Louis University Law Journal
No abstract provided.
Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin
Translating The Charitable Affectation In Private Law, Anne-Sophie Hulin
Journal of Civil Law Studies
Traduire sans trahir, voilà la difficulté du traducteur comme celle du comparatiste. Comment garantir que les notions, une fois passées au filtre juridique, ne subissent pas une certaine altération, et ne perdent par là un peu d’elles-mêmes? Cet article s’intéresse donc à un genre particulier de traduction où des concepts universels se voient convertis en notions juridiques. Dans le cas précis de la philanthropie, la traduction se révèle moins aisée en droit civil qu’en common law au point de s’interroger de la capacité de ce premier à accueillir les mécanismes philanthropiques. Il en ressort alors que les traditions juridiques n’ont …
Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells
Basic Questions Of Tort Law From A Comparative Perspective, Michael L. Wells
Journal of Civil Law Studies
No abstract provided.
Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur
Ruminations Around The Dictionary Of The Civil Code, Alain Levasseur
Journal of Civil Law Studies
No abstract provided.
Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade
Brazil: The Difficult Path Toward Democratization Of Civil Law, Lucas Abreu Barroso, Pablo Malheiros Da Cunha Frota, Brígida Roldi Passamani, Lúcio Moreira Andrade
Journal of Civil Law Studies
The Federal Constitution of 1988 reinstated the democratic rule of law in Brazil. Based on fundamental rights, the “Citizen’s Constitution” shaped the model of a welfare State, which objectives consist in the construction of a free, just and solidary society, the eradication of poverty and substandard living conditions and the promotion of the well-being of all, without prejudice as to origin, race, sex, color, age and any other forms of discrimination. From this context, the constitutional idealization of family democracy emerges, specifically represented in this paper by the recognition of civil union be-tween people of the same sex as family …
Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi
Les Termes Comme Miroir Et Loupe D’Une Société? L’Exemple Du Code Civil Italien, Enrica Bracchi
Journal of Civil Law Studies
La langue est souvent le vecteur de concepts et de visions propres à une société ou une partie de celle-ci ; c’est à travers la langue que se dévoilent les contradictions, le refus ou l’assentiment par rapport à de nouvelles réalités sociales et sociétales, qui peuvent être réglementées par le droit. Le droit, quant à lui, se sert de la langue pour nommer ces réalités et la terminologie juridique ou parajuridique devient d’une part un miroir qui reflète des tendances et des variations et d’autre part une loupe car elle amplifie les contrastes et les points de détail concernant certaines …
Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau
Pourquoi Et Comment Former Des Juristes Trilingues?, Dominique Garreau
Journal of Civil Law Studies
No abstract provided.
Jersey: Vocabularies Of Coûtume And Code, Steven Pallot
Jersey: Vocabularies Of Coûtume And Code, Steven Pallot
Journal of Civil Law Studies
The Channel Islands were an integral part of the Duchy of Normandy until 1204 when King John lost Continental Normandy to the French King, Philip Augustus. Jersey and Guernsey did not submit to the jurisdiction of the French King but retained allegiance to the King in England as Duke of Normandy. The customary laws of the Islands retain their Norman root to this day in spite of strong legal and cultural influences from England in the 19thand 20Centuries. A rich legal vocabulary in both French and English has evolved in these mixed legal jurisdictions.
This article examines the …
A Dialogue To Conclude A Conference On Legal Translation:Synthèse À Deux Voix, Matthias Martin, Olivier Moréteau
A Dialogue To Conclude A Conference On Legal Translation:Synthèse À Deux Voix, Matthias Martin, Olivier Moréteau
Journal of Civil Law Studies
No abstract provided.
Mixed Legal Systems, East And West, Stephen Thomson
Mixed Legal Systems, East And West, Stephen Thomson
Journal of Civil Law Studies
No abstract provided.
China: Fragmented Rights And Tragedy Of Anticommons:Evidence From China’S Coastal Waters, Bing Shui
China: Fragmented Rights And Tragedy Of Anticommons:Evidence From China’S Coastal Waters, Bing Shui
Journal of Civil Law Studies
The ownership of, and rights to, coastal waters are exhibited on a cumulative scale ranging from commons-like to private use. As an example of a natural resource with complex and interlinked ecosystems, coastal waters give rise to many kinds of legal norms and pol-icy instruments. As shown by my investigation of China’s coastal waters, people are willing to pay for legal rights which guarantee exclusive access, regardless of the relatively high cost. The statistical data further reveals that, when coastal waters are divided, there is a negative correlation between fragmentation of the seas and sea-based production. Therefore, based on the …
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Nuisance And The Normative Boundaries Of Ownership, Christopher Essert
Nuisance And The Normative Boundaries Of Ownership, Christopher Essert
Tulsa Law Review
A nuisance is an unreasonable interference with an owner’s right to use and enjoy her land. The tort of nuisance must be understood if we are to understand the nature, scope, and justification of private property rights. As the latter task is among the most important ones facing legal and political philosophers in a democratic society, such as ours, the former is crucial. Yet, we lack anything like a viable theory of nuisance law. The two most prominent—the economic view and the physical-invasion view—both fail, doc-trinally and normatively. Things are so bad for nuisance that it has been called a …
Expansion Of Employee Wellness Programs Under Ppaca Creates Additional Barriers To Healthcare Insurance For Individuals With Disabilities, Amy B. Cheng
Journal of Law and Health
There are many barriers to healthcare for the general population that has been documented throughout the years, with one particularly affected group being individuals with disabilities. One identified healthcare barrier for individuals with disabilities is the inability to gain access to the healthcare system through health insurance. While many attempts have been made to resolve this issue, serious problems have yet to be resolved. The Patient Protection Affordable Care Act (PPACA) attempted to solve the issue by expanding Health Insurance Portability and Accountability Act of 1996’s (HIPAA) current regulations on employee wellness programs. The relevant regulations govern employee wellness programs …