Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 14797

Full-Text Articles in Law

Análisis Económico De La Prueba De Oficio, Sebastian Gabriel Arruiz Dec 2016

Análisis Económico De La Prueba De Oficio, Sebastian Gabriel Arruiz

The Latin American and Iberian Journal of Law and Economics

The aim of this article is to analyze the consequences of proof ordered by the judge on his own, without any party request, in an adversarial trial.

I will demonstrate that proof ordered by the court on its own is against an adversarial system because it violates the principle of judicial impartiality. I will also conclude that this kind of proof is inefficient because it replaces activity that might be fulfilled by the parties with lower costs; it reduces the incentives for the parties to prove; it introduces distortions in legal professional services; and it increases the probability of making ...


The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski Dec 2016

The Contributions Of Louis Brandeis To The Law Of Lawyering, John S. Dzienkowski

Touro Law Review

No abstract provided.


Justice Scalia, The Establishment Clause, And Christian Privilege, Caroline Mala Corbin Dec 2016

Justice Scalia, The Establishment Clause, And Christian Privilege, Caroline Mala Corbin

Articles

No abstract provided.


Understanding The Aggregate Effects Of Criminal Prevention Policy: The Role Of Relative Safety In Argentina, Pablo Schiaffino, Sora Marcos, Martín Tetaz Dec 2016

Understanding The Aggregate Effects Of Criminal Prevention Policy: The Role Of Relative Safety In Argentina, Pablo Schiaffino, Sora Marcos, Martín Tetaz

The Latin American and Iberian Journal of Law and Economics

Criminal prevention policies necessarily affect safety in all neighborhoods at the same time, given the existing spillovers these policies entail. Thus they affect not only absolute but also relative safety in each neighborhood. This analysis studies how the perceived relative safety of one’s own neighborhood affects neighborhood satisfaction, which is one of the determinants of life satisfaction, and finds there is a diminishing marginal utility of relative safety.

Resumen

Dado que las políticas adoptadas para prevenir el crimen en un vecindario particular determinan los incentivos de los potenciales delincuentes, éstas afectan la seguridad de todos los vecindarios a nivel ...


De Jure And De Facto Institutions – Disentangling The Interrelationships, Jacek Lewkowicz, Katarzyna Metelska-Szaniawska Dec 2016

De Jure And De Facto Institutions – Disentangling The Interrelationships, Jacek Lewkowicz, Katarzyna Metelska-Szaniawska

The Latin American and Iberian Journal of Law and Economics

In this paper we contribute to the debate on the nature of institutions and their economic effects by extending the focus to the de jure de facto institutional distinction. Firstly, we define and conceptualize de facto institutions, as well as elaborate on their place in the broad institutional system and identification. Then we investigate the possible interrelationships between de facto and de jure institutions. Finally, we make a link between these interrelationships and economic outcomes. In this way the paper fills an underexploited niche in institutional research, which is a major background for law and economics.

Resumen

En este trabajo ...


Back Matter Dec 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead Dec 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Table Of Contents Dec 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah Dec 2016

Bloom Filters Optimized Wu-Manber For Intrusion Detection, Monther Aldwairi, Koloud Al-Khamaiseh, Fatima Alharbi, Babar Shah

Journal of Digital Forensics, Security and Law

With increasing number and severity of attacks, monitoring ingress and egress network traffic is becoming essential everyday task. Intrusion detection systems are the main tools for capturing and searching network traffic for potential harm. Signature-based intrusion detection systems are the most widely used, and they simply use a pattern matching algorithms to locate attack signatures in intercepted network traffic. Pattern matching algorithms are very expensive in terms of running time and memory usage, leaving intrusion detection systems unable to detect attacks in real-time. We propose a Bloom filters optimized Wu-Manber pattern matching algorithm to speed up intrusion detection. The Bloom ...


The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi Dec 2016

The 2016 Analysis Of Information Remaining On Computer Hard Disks Offered For Sale On The Second Hand Market In The Uae, Thomas Martin, Andy Jones, Mohammed Alzaabi

Journal of Digital Forensics, Security and Law

This research describes our survey of data remaining on computer hard disks sold on the second hand market in the United Arab Emirates (UAE). This is a repetition of the first survey conducted in 2012 (Jones, Martin, & Alzaabi, 2012). Similar studies have been carried over the last ten years in the United Kingdom, Australia, USA, Germany and France: (Jones, Mee, Meyler, & Gooch, 2005), (Jones, Valli, Sutherland, & Thomas, 2006), (Jones, Valli, Dardick, & Sutherland, 2008), (Jones, Valli, Dardick, & Sutherland, 2009). This research was undertaken to gain insight into the volumes of data found on second-hand disks purchased in the UAE, as well ...


Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh Dec 2016

Leveraging The Windows Amcache.Hve File In Forensic Investigations, Bhupendra Singh, Upasna Singh

Journal of Digital Forensics, Security and Law

The Amcache.hve is a registry hive file that is created by Microsoft® Windows® to store the information related to execution of programs. This paper highlights the evidential potential of Amcache.hve file and its application in the area of user activity analysis. The study uncovers numerous artifacts retained in Amcache.hve file when a user performs certain actions such as running host-based applications, installation of new applications, or running portable applications from external devices. The results of experiments demonstrate that Amcache.hve file stores intriguing artifacts related to applications such as timestamps of creation and last modification of any ...


The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler Dec 2016

The Impact Of Sha-1 File Hash Collisions On Digital Forensic Imaging: A Follow-Up Experiment, Gary C. Kessler

Journal of Digital Forensics, Security and Law

A previous paper described an experiment showing that Message Digest 5 (MD5) hash collisions of files have no impact on integrity verification in the forensic imaging process. This paper describes a similar experiment applied when two files have a Secure Hash Algorithm (SHA-1) collision.


The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler Dec 2016

The Impact Of Md5 File Hash Collisions On Digital Forensic Imaging, Gary C. Kessler

Journal of Digital Forensics, Security and Law

The Message Digest 5 (MD5) hash is commonly used as for integrity verification in the forensic imaging process. The ability to force MD5 hash collisions has been a reality for more than a decade, although there is a general consensus that hash collisions are of minimal impact to the practice of computer forensics. This paper describes an experiment to determine the results of imaging two disks that are identical except for one file, the two versions of which have different content but otherwise occupy the same byte positions on the disk, are the same size, and have the same hash ...


A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi Dec 2016

A New Distributed Chinese Wall Security Policy Model, Saad Fehis, Omar Nouali, Mohand-Tahar Kechadi

Journal of Digital Forensics, Security and Law

The application of the Chinese wall security policy model (CWSPM) to control the information flows between two or more competing and/or conflicting companies in cloud computing (Multi-tenancy) or in the social network, is a very interesting solution. The main goal of the Chinese Wall Security Policy is to build a wall between the datasets of competing companies, and among the system subjects. This is done by the applying to the subjects mandatory rules, in order to control the information flow caused between them. This problem is one of the hottest topics in the area of cloud computing (as a ...


A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun Dec 2016

A Survey Of Social Network Forensics, Umit Karabiyik, Muhammed Abdullah Canbaz, Ahmet Aksoy, Tayfun Tuna, Esra Akbas, Bilal Gonen, Ramazan S. Aygun

Journal of Digital Forensics, Security and Law

Social networks in any form, specifically online social networks (OSNs), are becoming a part of our everyday life in this new millennium especially with the advanced and simple communication technologies through easily accessible devices such as smartphones and tablets. The data generated through the use of these technologies need to be analyzed for forensic purposes when criminal and terrorist activities are involved. In order to deal with the forensic implications of social networks, current research on both digital forensics and social networks need to be incorporated and understood. This will help digital forensics investigators to predict, detect and even prevent ...


The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat Dec 2016

The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat

Public Law and Legal Theory Working Papers

No abstract provided.


The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat Dec 2016

The Future Of Law And Economics And The Calabresian External Moral Costs, Ariel Porat

Coase-Sandor Working Paper Series in Law and Economics

No abstract provided.


Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing Dec 2016

Competitiveness, Tax Base Erosion, And The Essential Dilemma Of Corporate Tax Reform, Kimberly A. Clausing

BYU Law Review

Label contradicts reality for the U.S. international corporate tax system. The U.S. system is typically labeled as a worldwide tax system with a statutory rate of 35%, both uncommon features among our trading partners. Yet these markers of the U.S. tax system do not accurately describe reality, where multinational firms routinely face far lower effective tax rates and little, if any, tax is collected on foreign income. Understanding this discrepancy between label and reality is essential to evaluate recent policy debates surrounding corporate inversions and the competitiveness of the U.S. international tax system. Although there is ...


Beps And The New International Tax Order, Allison Christians Dec 2016

Beps And The New International Tax Order, Allison Christians

BYU Law Review

Nations across the world are currently engaged in a coordinated international effort, ostensibly to curb excessive tax avoidance by the world’s biggest multinational companies. This Article contends, however, that the most likely impact will be to entrench a monopoly held by a small number of rich countries over the policymaking processes that created the tax avoidance problem to begin with. To examine this contention and probe possible solutions to it, the Article considers the legal and institutional components of the coordination project, by situating them historically and analyzing their multi-functionality as both norm diffusion and institutional reinforcement mechanisms. The ...


Defending Worldwide Taxation With A Shareholder-Based Definition Of Corporate Residence, J. Clifton Fleming Jr., Robert J. Peroni, Stephen E. Shay Dec 2016

Defending Worldwide Taxation With A Shareholder-Based Definition Of Corporate Residence, J. Clifton Fleming Jr., Robert J. Peroni, Stephen E. Shay

BYU Law Review

This Article argues that a principled, efficient, and practical definition of corporate residence is necessary even if some form of corporate integration is adopted, and that such a definition is a key element in designing either a real worldwide or a territorial income tax system as well as a potential restraint on the inversion phenomenon. The Article proposes that the United States adopt a shareholder-based definition of corporate residence that is structured as follows: 1. A foreign corporation is a U.S. tax resident for any year if fifty percent or more of its shares, determined by vote or value ...


The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian Dec 2016

The Other Eighty Percent: Private Investment Funds, International Tax Avoidance, And Tax-Exempt Investors, Omri Marian

BYU Law Review

The taxation of private equity managers’ share of funds’ profits—the twenty percent “carried interest”—received much attention in academic literature and popular discourse. Much has been said and written about the fact that fund managers’ profits are taxed at preferred rates. But what about the other eighty percent of funds’ profits? This Article theorizes that the bulk of such profits are never taxed. This is a result of a combination of three factors: First, private equity, venture capital, and hedge funds (collectively, Private Investment Funds, or “PIFs”) are major actors in cross-border investment activity. This enables PIFs to take ...


Developing Countries In An Age Of Transparency And Disclosure, Diane Ring Dec 2016

Developing Countries In An Age Of Transparency And Disclosure, Diane Ring

BYU Law Review

No abstract provided.


Inversions, Related Party Expenditures, And Source Taxation: Changing The Paradigm For The Taxation Of Foreign And Foreign-Owned Businesses, Julie A. Roin Dec 2016

Inversions, Related Party Expenditures, And Source Taxation: Changing The Paradigm For The Taxation Of Foreign And Foreign-Owned Businesses, Julie A. Roin

BYU Law Review

The disconnect between the rules for the taxation of domestic businesses and foreign and foreign-owned businesses operating in the United States both diminishes the federal treasury and distorts taxpayer and business behavior. Yet bringing the sets of rules into closer coordination is no simple task. This Article examines many of the solutions proffered in the academic literature and details the difficulties and trade-offs that each entails.


The Foreign Tax Credit War, Bret Wells Dec 2016

The Foreign Tax Credit War, Bret Wells

BYU Law Review

The government has been involved in a sustained war against objectionable foreign tax credit transactions. This war has caused the U.S. foreign tax credit regime to be riddled with complexity that spawns incoherent outcomes. The complexity contained in section 901 was created due to a legitimate concern: the threats posed by objectionable transactions that artificially generate excess foreign tax credits represent real policy problems. Since at least 1975, Congress and the Treasury Department have been convinced that the cross-crediting of excess foreign tax credits arising from “objectionable transactions” required a response in addition to simply relying on section 904 ...


The Hostile Poison Pill, A. Christine Hurt Dec 2016

The Hostile Poison Pill, A. Christine Hurt

Faculty Scholarship

No abstract provided.


R&D Tax Incentives--Growth Panacea Or Budget Trojan Horse?, Stephen E. Shay, J. Clifton Fleming Jr., Robert J. Peroni Dec 2016

R&D Tax Incentives--Growth Panacea Or Budget Trojan Horse?, Stephen E. Shay, J. Clifton Fleming Jr., Robert J. Peroni

Faculty Scholarship

No abstract provided.


Two Cheers For The Foreign Tax Credit, Even In The Beps Era, J. Clifton Fleming Jr., Robert J. Peroni, Stephen E. Shay Dec 2016

Two Cheers For The Foreign Tax Credit, Even In The Beps Era, J. Clifton Fleming Jr., Robert J. Peroni, Stephen E. Shay

Faculty Scholarship

Reform of the U.S. international income taxation system has been a hotly debated topic for many years. The principal competing alternatives are a territorial or exemption system and a worldwide system. For reasons summarized in this article, we favor worldwide taxation if it is real worldwide taxation – i.e., a non-deferred U.S. tax is imposed on all foreign income of U.S. residents at the time the income in earned. This approach is not acceptable, however, unless the resulting double taxation is alleviated. The longstanding U.S. approach for handling the international double taxation problem is a foreign ...


The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London Dec 2016

The Pride Of The Common Law: Oklahoma's Struggle With The Prima Facie Tort Action, Matthew C. Kane, Ivan L. London

Tulsa Law Review

No abstract provided.


Is The Internet Rotting Oklahoma Law?, Lee F. Peoples Dec 2016

Is The Internet Rotting Oklahoma Law?, Lee F. Peoples

Tulsa Law Review

No abstract provided.