Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

Discipline
Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 1008

Full-Text Articles in Law

The Impact Of Restricting Labor Mobility On Corporate Investment And Entrepreneurship, Jessica Jeffers Oct 2018

The Impact Of Restricting Labor Mobility On Corporate Investment And Entrepreneurship, Jessica Jeffers

Law, Economics, & Business Workshop

No abstract provided.


China As A 'National Strategic Buyer': Towards Amultilateral Regime For Cross-Border M&A, Curtis Milhaupt Oct 2018

China As A 'National Strategic Buyer': Towards Amultilateral Regime For Cross-Border M&A, Curtis Milhaupt

Law, Economics, & Business Workshop

No abstract provided.


Estimating The Compliance Costs Of Securities Regulation: A Bunching Analysis, Dhammika Dharmapala Oct 2018

Estimating The Compliance Costs Of Securities Regulation: A Bunching Analysis, Dhammika Dharmapala

Law, Economics, & Business Workshop

No abstract provided.


Investors' Attention To Corporate Governance, Michelle Lowry Sep 2018

Investors' Attention To Corporate Governance, Michelle Lowry

Law, Economics, & Business Workshop

No abstract provided.


The Bankruptcy Partition, Anthony Casey Sep 2018

The Bankruptcy Partition, Anthony Casey

Law, Economics, & Business Workshop

No abstract provided.


Deleting Misconduct: The Expungement Of Brokercheck Records, Colleen Honigsberg Aug 2018

Deleting Misconduct: The Expungement Of Brokercheck Records, Colleen Honigsberg

Law, Economics, & Business Workshop

No abstract provided.


Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara Aug 2018

Understanding The Sexual Assault Kit Backlog In Pennsylvania, Kallie Crawford, Lyndsie Ferrara

Graduate Student Research Symposium

According to the FBI, to date, there are more than 400,000 untested sexual assault kits nationwide. While this is a huge issue that cannot be solved overnight, continual improvements and changes are needed to reduce and hopefully eliminate the backlog.

This research examines work going on nationwide and aims to better understand the backlog issues specifically in Pennsylvania. Furthermore, the research examines a program utilized by the law enforcement community that garnered necessary resources. First, a comprehensive review of improved practices in proactive jurisdictions of Ohio, Houston, Texas, and Detroit, Michigan was conducted to identify general policies and procedures ...


Essential Air Service: A Lower Rung On The Pilot Shortage Food Chain?, Michael Peck Aug 2018

Essential Air Service: A Lower Rung On The Pilot Shortage Food Chain?, Michael Peck

National Training Aircraft Symposium (NTAS)

The Essential Air Service (EAS) program, established in 1978 by the federal government as a temporary measure designed to help remote communities cope with the impact of airline deregulation, subsidizes flights to certain destinations that would not otherwise have ready access to commercial air service. The airlines participating in this program fly relatively smaller aircraft and have traditionally hovered at the lower end of the salary scale. Their pilots are, nevertheless, subject to the same flight experience requirements as the major carriers. The national (or perhaps international) pilot shortage has caused some EAS carriers to abruptly terminate service leaving the ...


Investment Spending And Gdp, Kevin Zaldivar Jun 2018

Investment Spending And Gdp, Kevin Zaldivar

Celebration of Learning

This study's mission is to give a modern day analysis to investment spending and to provide insight to the degree of impact certain investments have on our GDP. This should interest local,state,and federal policy makers as well as anyone who practices their civic duty.


Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta Jun 2018

Reconsidering The Immutability Of "Race": An Examination Of The Disconnect Between "Race" In Title Vii Jurisprudence And Social Science Literature, Natalie Tupta

Graduate Student Research Symposium

This paper discusses reconceptualizing racial discrimination under Title VII of the Civil Rights Act in light of modern social science theories on racial identity. Title VII prohibits employment discrimination on the basis of race, color, religion, sex, or national origin, and the judiciary calls these bases for discrimination “protected classes.” To bring a successful legal claim under Title VII, a person must demonstrate that she actually belongs to a protected class. In the case of a claim of racial discrimination, this means the plaintiff must belong to a racial group based on immutable characteristics, which are traits that cannot simply ...


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming May 2018

A Survey Of Lawyers’ Cyber Security Practises In Western Australia, Craig Valli, Mike Johnstone, Rochelle Fleming

Annual ADFSL Conference on Digital Forensics, Security and Law

This paper reports on the results of a survey that is the initial phase of an action research project being conducted with the Law Society of Western Australia. The online survey forms a baseline for the expression of a targeted training regime aimed at improving the cyber security awareness and posture of the membership of the Society. The full complement of over 3000 members were given the opportunity to participate in the survey, with 122 members responding in this initial round. The survey was designed to elicit responses about information technology use and the awareness of good practices with respect ...


Rethinking Health Partnerships: Florida International University Herbert Wertheim College Of Medicine’S Medical-Legal Partnership, Natalie K. Castellanos, Nana Aisha Garba, Ebony Whisenant May 2018

Rethinking Health Partnerships: Florida International University Herbert Wertheim College Of Medicine’S Medical-Legal Partnership, Natalie K. Castellanos, Nana Aisha Garba, Ebony Whisenant

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Medical-legal partnership is a healthcare innovation aimed at addressing social determinants of health by adding lawyers to the healthcare team. Florida International University’s Herbert Wertheim College of Medicine (HWCOM) is leading innovation in teaching social determinants of health, interprofessional education, and medical-legal collaboration by way of its flagship service-learning program, Green Family Foundation Neighborhood Health Education Learning Program. This poster will demonstrate how the medical-legal partnership approach to addressing social determinants of health is applied at HWCOM, and present data on how exposure to medical-legal partnership is impacting the thinking of HWCOM students. The poster will feature data from ...


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical ...


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows ...


States Of Mind: Exploring “Energy Sources” To Support Thinking, Stephen R. Seward May 2018

States Of Mind: Exploring “Energy Sources” To Support Thinking, Stephen R. Seward

ICOT 18 - International Conference on Thinking - Cultivating Mindsets for Global Citizens

Submission Title and Descriptor for Review

States of Mind: Exploring “Energy Sources” to Support Thinking

Facing uncertainty, complex problems, and managing non-linear dynamical change are part of our existence. By examining the “States of Mind”—efficacy, craftsmanship, consciousness, flexibility, interdependence—we are able clarify thinking, encouraging divergence and resourcefulness. Aquire strategies to develop mindfulness and thinking dispositions. Participants will learn about the states of mind, design questions to engage thinking, and engage in collaborative dialogue. Explore and plan next steps for becoming more strategic in your capabilities to create positive thinking and adaptive change within yourself and those you interact ...


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues ...


Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy May 2018

Forensic Analysis Of The Exfat Artifacts, Yves Vandermeer, An Lekhac, Tahar Kechadi, Joe Carthy

Annual ADFSL Conference on Digital Forensics, Security and Law

Although keeping some basic concepts inherited from FAT32, the exFAT file system introduces many differences, such as the new mapping scheme of directory entries. The combination of exFAT mapping scheme with the allocation of bitmap files and the use of FAT leads to new forensic possibilities. The recovery of deleted files, including fragmented ones and carving becomes more accurate compared with former forensic processes. Nowadays, the accurate and sound forensic analysis is more than ever needed, as there is a high risk of erroneous interpretation. Indeed, most of the related work in the literature on exFAT structure and forensics, is ...


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The ...


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed ...


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence ...


Responsibility In Just War Theory, Isabel Canfield Apr 2018

Responsibility In Just War Theory, Isabel Canfield

Senior Symposium

This project examines the Responsibility Dilemma in revisionist just war theory. Just war theory is the study of applied military ethics and revisionist just war theory is a more recent school of thought within just war theory. The Responsibility Dilemma, a problem noted by Seth Lazar, results from the challenges that arise when responsibility for the threat of harm in war is assigned to individual soldiers. I begin this project by exploring the predominant views in just war theory. Then, I look at the Responsibility Dilemma and the solutions that various philosophers have offered. Finally, I conclude that none of ...


Shots Fired: Examining Cues In Polic Use Of Force Encounters, Ronald Gaines Jr. Apr 2018

Shots Fired: Examining Cues In Polic Use Of Force Encounters, Ronald Gaines Jr.

Scholar Week 2016 - present

Officer-involved shootings lead to a costly process where lives are lost, careers are ruined, and taxpayer dollars are spent on investigation and litigation costs. The purpose of this study was to examine the cues that are associated with incidents that resulted in a police officer’s use of lethal as opposed to less than lethal force to increase awareness, enhance police safety, and improve training and supervision. Through the current quantitative correlational study, the researcher aimed to add to the discussion on police use of force. The researcher collected and analyzed preexisting sets of data from tactical response reports obtained ...


Examining Police Officer Resistance To Change And Body-Worn Cameras, Wayne Jakobitz Jr. Apr 2018

Examining Police Officer Resistance To Change And Body-Worn Cameras, Wayne Jakobitz Jr.

Scholar Week 2016 - present

Police departments are adopting the body-worn camera as an important tool in the restoration of trust and accountability for police officers. Although body-worn cameras can be beneficial to their work, police officers might resist the use of cameras. The purpose of the current study was to examine whether experiences with technology or the perceived usefulness of body-worn cameras predict resistance to the cameras in order to determine where resistance to body-worn cameras possibly exists. The current study employed a quantitative design that examined 48 (n = 48) police officers’ responses about resistance to body-worn cameras in relationship to the following variables ...


Cruel And Unusual: A Look Into Prisoner Mental Health Care, Adonia Delgado Hipp Apr 2018

Cruel And Unusual: A Look Into Prisoner Mental Health Care, Adonia Delgado Hipp

Scholarly & Creative Works Conference 2019

The United States incarcerates more of its citizens than any other country (Blumstein & Wallman, 2000). In fact, the rate of incarceration is more than five times higher than most of the countries in the world. Recent studies indicate that “Crowded living quarters, lack of privacy, increased risk of victimization, and solitary confinement within the institution have been identified as strong correlates for self-harm and adaptation challenges for those with mental health conditions in prison settings” (Gonzalez et al., 2014). One of the greatest persistent injustices of modern criminal law is that not only are poor people and people of color ...


Tax On Success: Shareholder Litigation As A Cost Of Successful Innovation, Elisabeth Kempf Apr 2018

Tax On Success: Shareholder Litigation As A Cost Of Successful Innovation, Elisabeth Kempf

Law, Economics, & Business Workshop

No abstract provided.


Morning Session, Golden Gate University School Of Law Apr 2018

Morning Session, Golden Gate University School Of Law

Fulbright Symposium

• Master of Ceremonies: Dr. Remigius Chibueze, Adjunct Professor of Law, Golden Gate University

• Opening Remarks: Dr. David Fike, President, Golden Gate University • Welcome Remarks: Anthony Niedwiecki, Dean, School of Law, Golden Gate University

• Introduction of Keynote Speaker Professor Kwame Mfodwo: Professor Dr. Christian Nwachukwu Okeke, Director, The Sompong Sucharitkul Center for Advanced International Legal Studies and Chair of the Symposium.