Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Intellectual Property Law (37)
- Legal Writing and Research (9)
- Social and Behavioral Sciences (9)
- Criminal Law (8)
- Legal Education (8)
-
- Science and Technology Law (7)
- Constitutional Law (6)
- Legal Profession (6)
- Physical Sciences and Mathematics (5)
- Evidence (4)
- Fourth Amendment (4)
- Law Librarianship (4)
- Library and Information Science (4)
- Natural Resources Law (4)
- Arts and Humanities (3)
- Courts (3)
- Judges (3)
- Legal Studies (3)
- National Security Law (3)
- State and Local Government Law (3)
- Supreme Court of the United States (3)
- Administrative Law (2)
- Civil Rights and Discrimination (2)
- Comparative and Foreign Law (2)
- Computer Law (2)
- Computer Sciences (2)
- Environmental Health and Protection (2)
- Environmental Sciences (2)
- Law Enforcement and Corrections (2)
- Institution
-
- Northwestern Pritzker School of Law (32)
- Roger Williams University (8)
- SelectedWorks (8)
- Selected Works (3)
- University of Massachusetts School of Law (3)
-
- Fordham Law School (2)
- Penn State Law (2)
- Santa Clara Law (2)
- St. John's University School of Law (2)
- Touro University Jacob D. Fuchsberg Law Center (2)
- Universitas Indonesia (2)
- University of Colorado Law School (2)
- University of New Hampshire (2)
- Embry-Riddle Aeronautical University (1)
- Fordham University (1)
- George Washington University Law School (1)
- Louisiana State University (1)
- Marquette University Law School (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Pace University (1)
- Schulich School of Law, Dalhousie University (1)
- Southern Methodist University (1)
- St. Mary's University (1)
- University of Baltimore Law (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Richmond (1)
- University of Washington School of Law (1)
- University of Wollongong (1)
- Publication Year
- Publication
-
- Northwestern Journal of Technology and Intellectual Property (32)
- Estelle Derclaye (8)
- Law Library Newsletters/Blog (7)
- Ann Bartow (2)
- Faculty Publications (2)
-
- Fordham Urban Law Journal (2)
- Journal Articles (2)
- Jurnal Hukum & Pembangunan (2)
- University of Massachusetts Law Review (2)
- All Faculty Scholarship (1)
- Articles (1)
- Best Management Practices (BMPs): What? How? And Why? (May 26) (1)
- Books (1)
- Digital Pedagogy: Medieval Londoners Mapping Project (1)
- Elisabeth Haub School of Law Faculty Publications (1)
- Faculty Articles (1)
- Faculty Journal Articles and Book Chapters (1)
- Faculty of Law, Humanities and the Arts - Papers (Archive) (1)
- GW Law Faculty Publications & Other Works (1)
- Journal of Civil Rights and Economic Development (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of Race, Gender, and Ethnicity (1)
- Law Faculty Publications (1)
- Law Faculty Scholarship (1)
- Law School Blogs (1)
- Marquette Elder's Advisor (1)
- Nachshon Goltz (1)
- RISK: Health, Safety & Environment (1990-2002) (1)
- Review of law sciences (1)
- Rosetta Stone v. Google (Joint Appendix) (1)
- Publication Type
- File Type
Articles 1 - 30 of 85
Full-Text Articles in Law
Law Library Blog (October 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (October 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Database Floklore Dalam Undang-Undang Tentang Hak Cipta Dan Undang-Undang Tentang Pemajuan Kebudayaan, Lora Sinta Sulistiorini
Database Floklore Dalam Undang-Undang Tentang Hak Cipta Dan Undang-Undang Tentang Pemajuan Kebudayaan, Lora Sinta Sulistiorini
Jurnal Hukum & Pembangunan
Law 28/2014 on Copyright and Law 5/2017 on Cultural Promotion have a major role in regulating and protecting floklore. This can be seen from the norms that regulate the mechanism for protecting floklore in Article 38 paragraph (2) of the Copyright Law, which states that the state is obliged to make an inventory, maintain, and maintain traditional cultural expressions.law a quo also regulates the procedures for recording as contained in Articles 66-72. Not only that, the Law for the Advancement of Culture also regulates the floklore database through Articles 16-26 of a quo. The two laws then raise the question, …
Solving Crimes With 23andme: Dna Databases And The Future Of Law Enforcement, Meghan Mcloughlin
Solving Crimes With 23andme: Dna Databases And The Future Of Law Enforcement, Meghan Mcloughlin
Journal of Civil Rights and Economic Development
(Excerpt)
“It could never happen to me though, right?”
Sitting on our comfortable couches in our secure homes and watching news stories about people who have lost loved ones to the most terrible, violent crimes, we think to ourselves: “That’s awful for them, but it won’t happen to me.” But what if it did?
Becoming a victim of a violent crime or loving someone who becomes a victim of a crime in the United States is not uncommon. In 2016, 2.9 million people in the United States were victims of at least one “violent crime”—crimes defined by their inherent violence, …
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (January 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Law Library Blog (September 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (September 2021): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
A. Part I Mld Mapping Assignment And Instructions, Maryanne Kowaleski, Camila Marcone
A. Part I Mld Mapping Assignment And Instructions, Maryanne Kowaleski, Camila Marcone
Digital Pedagogy: Medieval Londoners Mapping Project
Notes the aims of the assignment, lists resources to help students do research on the deeds, and gives detailed instructions for A) structuring the data about people in the deed into the MLD Mapping Sheet and B) preparing the data about the property for entry into the online mapping platform, Layers of London, using the Layers of London Grid.
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
Dna Is Different: An Exploration Of The Current Inadequacies Of Genetic Privacy Protection In Recreational Dna Databases, Jamie M. Zeevi
St. John's Law Review
(Excerpt)
Part I of this Note discusses the fundamental science behind DNA and defines and explains the process of familial DNA searching. Part I also discusses how Carpenter v. United States provides a framework to begin thinking about the unique nature of DNA and privacy implications for its use, and why the revealing nature of this type of data warrants protection. Part II of this Note delves into the lack of constitutional and statutory protections for DNA in recreational DNA databases. First, Part II explains that traditional Fourth Amendment concepts, like search warrants, probable cause, reasonable expectation of privacy, third-party …
Police Brutality And State-Sanctioned Violence In 21st Century America, Itohen Ihaza
Police Brutality And State-Sanctioned Violence In 21st Century America, Itohen Ihaza
Journal of Race, Gender, and Ethnicity
No abstract provided.
The “Step-Child Of Scholarly Investigation”: Preliminary Observations About The Origins Of Academic Jewish Law Scholarship, David Hollander
The “Step-Child Of Scholarly Investigation”: Preliminary Observations About The Origins Of Academic Jewish Law Scholarship, David Hollander
Touro Law Review
No abstract provided.
Law Library Blog (November 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (November 2018): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Сivil Legal Protection Of A Database According To The Legislation Of Foreign Countries, Q.A. Mehmonov
Сivil Legal Protection Of A Database According To The Legislation Of Foreign Countries, Q.A. Mehmonov
Review of law sciences
The article considers the legal regime of the database on legislation of the Republic of Uzbekistan. The author analyzes the world experience of determining the legal regime of databases, the sui generis institute due to European law, the opinion of scientists of civilizations on defining the legal regime, established with respect to databases. In conclusion, the author gives his suggestions on improving the legislative framework.
Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso
Gun Control To Major Tom: An Analysis Of Failed Gun Regulations And The Terrorist Watchlist, Paolo G. Corso
University of Massachusetts Law Review
As a division of the Federal Bureau of Investigation’s National Security Branch, the Terrorist Screening Center maintains the Terrorist Watchlist, a central database for identifying individuals known or suspected to engage in terrorism or terrorist activities. Subsumed under the Terrorist Watchlist is the No Fly List, which prohibits individuals from boarding commercial aircrafts in and out of the United States. Placement on either list presumes named individuals as a potential threat to U.S. national security, yet there is no restriction preventing them from legally purchasing firearms. Following a mass shooting at an Orlando nightclub in June of 2016, which was …
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Journal of Digital Forensics, Security and Law
One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company’s database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on:
- How an attacker can exploit …
Trending @ Rwu Law: Raquel Ortiz's Post: Deepening Connections Between Rwu Law And The State Bench And Bar: Library Edition 04-27-2017, Raquel Ortiz
Law School Blogs
No abstract provided.
Law Library Blog (April 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (April 2017): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Inventarisasi Ekspresi Budaya Tradisional Secara Terstruktur Sebagai Upaya Perlindungan Pengetahuan Tradisional, Isti Novianti
Inventarisasi Ekspresi Budaya Tradisional Secara Terstruktur Sebagai Upaya Perlindungan Pengetahuan Tradisional, Isti Novianti
Jurnal Hukum & Pembangunan
Indonesia is a country that has an assortment of tribes and customs. To be observed the diverse cultures that exist so that governments are required to keep to be preserved properly. To know and recognize traditional cultures of various regions will require a data base that includes the traditional knowledge in Indonesia. This database can also be used as a source of information that can be accessed both international and domestic. In this case the central government and regional governments are given the authority to inventory Traditional Cultural Expressions. Effort into making the database has been started in the discourse …
Law Library Blog (September 2015): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Blog (September 2015): Legal Beagle's Blog Archive, Roger Williams University School Of Law
Law Library Newsletters/Blog
No abstract provided.
Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto
Brief Of Amici Curiae Former Consular Officers In Support Of Respondent, Kerry V. Din, No. 13-1402 United States Supreme Court, Ira J. Kurzban, Edward F. Ramos, Jeffrey D. Kahn, Trina Realmuto
Faculty Journal Articles and Book Chapters
This brief argues that certain visa application denials, particularly those based on information originating from agencies other than the Department of State, can be qualitatively different from denials based on consular discretion. Although the end result looks the same – “Visa Denied” – denials based on database and watchlist information maintained in the United States by the Department of Homeland Security, the FBI, and other agencies, bear little resemblance to the traditional exercise of consular discretion because the specific information which requires the consular officer to deny these visas is usually not available for him or her to evaluate. Real …
A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles
A Critique Of The Second Circuit’S Analysis In Nicholas V. Goord, John Dorsett Niles
University of Massachusetts Law Review
The Case Note proceeds as follows. Part I traces the historical and procedural facts underlying Nicholas. Part II describes the legal backdrop against which the United States Court of Appeals for the Second Circuit decided the case. Part III steps through the Second Circuit’s majority opinion, and Part IV critiques the opinion. Part V concludes the Case Note by discussing the ramifications of Nicholas for future DNA-indexing cases.
S14rs Sgr No. 12 (Syllabus Database), Latham, Andrew Mullet, Muehleman
S14rs Sgr No. 12 (Syllabus Database), Latham, Andrew Mullet, Muehleman
Student Senate Enrolled Legislation
No abstract provided.
The Coral Triangle Atlas: An Integrated Online Spatial Database System For Improving Coral Reef Management, Annick Cros, Nurulhuda Ahamad Fatan, Alan White, Shwu Jiau Teoh, Stanley Tan, Christian Handayani, Charles Huang, Nate Peterson, Ruben Venegas Li, Hendra Yusran Siry, Ria Fitriana, Jamison Gove, Tomoko Acoba, Maurice Knight, Renerio Acosta, Neil L. Andrew, Doug Beare
The Coral Triangle Atlas: An Integrated Online Spatial Database System For Improving Coral Reef Management, Annick Cros, Nurulhuda Ahamad Fatan, Alan White, Shwu Jiau Teoh, Stanley Tan, Christian Handayani, Charles Huang, Nate Peterson, Ruben Venegas Li, Hendra Yusran Siry, Ria Fitriana, Jamison Gove, Tomoko Acoba, Maurice Knight, Renerio Acosta, Neil L. Andrew, Doug Beare
Faculty of Law, Humanities and the Arts - Papers (Archive)
In this paper we describe the construction of an online GIS database system, hosted by WorldFish, which stores bio-physical, ecological and socio-economic data for the 'Coral Triangle Area' in South-east Asia and the Pacific. The database has been built in partnership with all six (Timor-Leste, Malaysia, Indonesia, The Philippines, Solomon Islands and Papua New Guinea) of the Coral Triangle countries, and represents a valuable source of information for natural resource managers at the regional scale. Its utility is demonstrated using biophysical data, data summarising marine habitats, and data describing the extent of marine protected areas in the region.
Comments On Maryland V. King In 'U.S. Supreme Court To Hear Arguments Over Md. Dna Case: Justices' Decision Will Have National Implications On Future Crime-Fighting Procedures', Colin Starger
All Faculty Scholarship
No abstract provided.
Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe
Safe To Be Open: Study On The Protection Of Research Data And Recommendations For Access And Usage, Lucie Guibault, Andreas Wiebe
Books
Openness has become a common concept in a growing number of scientific and academic fields. Expressions such as Open Access (OA) or Open Content (OC) are often employed for publications of papers and research results, or are contained as conditions in tenders issued by a number of funding agencies. More recently the concept of Open Data (OD) is of growing interest in some fields, particularly those that produce large amounts of data – which are not usually protected by standard legal tools such as copyright. However, a thorough understanding of the meaning of Openness – especially its legal implications – …
Empirical Associative Regulation – Drawing Future Regulatory Tools From The Experience Of The Past, Nachshon Goltz
Empirical Associative Regulation – Drawing Future Regulatory Tools From The Experience Of The Past, Nachshon Goltz
Nachshon Goltz
Traditionally, theories on regulation have suggested choosing the “right” regulatory tool for a given situation of desired behavioral steer, using a broad theoretical approach of understanding the factors involved in the regulatory realm and speculating or deducting from it toward the efficient choice.
In contrast, I am arguing that the process of choosing the “right” regulatory tool should be guided by an opposite process, in which a database of regulatory success and failure case studies will be created. The institute (i.e., governments, regulation agencies, etc.) seeking to steer behavior using regulatory tools (“the regulator”) will search this information body using …
Web Site Review: Elderlawanswers.Com Provides Services To Attorneys And Seniors, Kathryn Hensiak
Web Site Review: Elderlawanswers.Com Provides Services To Attorneys And Seniors, Kathryn Hensiak
Marquette Elder's Advisor
No abstract provided.
Recent French Decisions On Database Protection: Towards A More Consistent And Compliant Approach With The Court Of Justice’S Case Law?, Estelle Derclaye
Recent French Decisions On Database Protection: Towards A More Consistent And Compliant Approach With The Court Of Justice’S Case Law?, Estelle Derclaye
Estelle Derclaye
Since the official date of implementation of the Database Directive , namely the 1 January 1998, 14 years have now already passed. During this decade and a half, French courts have handed down around 30 decisions on database protection. Between 1998 and 2004, the year when the Court of Justice of the European Union (CJEU) handed down its first four parallel rulings on the sui generis right , the French case law on the sui generis right was quite erratic. Admittedly, such state of affairs was not dissimilar in other Member States owing to the sheer novelty of the sui …
Slides: Bmps For Reclamation: Do We Know What Is Effective?, Peter Stahl
Slides: Bmps For Reclamation: Do We Know What Is Effective?, Peter Stahl
Best Management Practices (BMPs): What? How? And Why? (May 26)
Presenter: Pete Stahl, Wyoming Reclamation and Restoration Center
19 slides
Unraveling The Exclusionary Rule: From Leon To Herring To Robinson - And Back?, David H. Kaye
Unraveling The Exclusionary Rule: From Leon To Herring To Robinson - And Back?, David H. Kaye
Journal Articles
The Fourth Amendment exclusionary rule began to unravel in United States v. Leon. The facts were compelling. Why exclude reliable physical evidence from trial when it was not the constable who blundered, but “a detached and neutral magistrate” who misjudged whether probable cause was present and issued a search warrant? Later cases applied the exception for “good faith” mistakes to a police officer who, pursuing a grudge against a suspect, arrested and searched him and his truck on the basis of a false and negligent report from a clerk in another county of an outstanding arrest warrant. The California Supreme …
Vol. Xii, Tab 49 - Declaration Of Thai Le In Support Of Google's Opposition To Partial Summary Judge As To Liability, Thai Le
Rosetta Stone v. Google (Joint Appendix)
Exhibits from the un-sealed joint appendix for Rosetta Stone Ltd., v. Google Inc., No. 10-2007, on appeal to the 4th Circuit. Issue presented: Under the Lanham Act, does the use of trademarked terms in keyword advertising result in infringement when there is evidence of actual confusion?