Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2020

Conference

Discipline
Institution
Keyword
Publication

Articles 1 - 5 of 5

Full-Text Articles in Criminal Law

The Acquisition Of Scientific Evidence Between Frye And Daubert. From Ad Hominem Arguments To Cross-Examination Among Experts, Lorenzo Zoppellari Jun 2020

The Acquisition Of Scientific Evidence Between Frye And Daubert. From Ad Hominem Arguments To Cross-Examination Among Experts, Lorenzo Zoppellari

OSSA Conference Archive

The Frye and Daubert rulings give us two very different ways to intend the relation between law and science. Through the contributions of Wellman and Walton, we will see how the main method to question the expert’s testimony before a judge deferent to science is to question her personal integrity by using ad hominem arguments. Otherwise, using Alvin Goldman’s novice/expert problem, we will investigate if other manners of argumentative cross-examinations are possible.


The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh Mar 2020

The Disconnect Between Forensic Science And The Lawyers And Judges Who Represent It, Hannah Reidenbaugh

Graduate Student Research Symposium

The goal of this research is to demonstrate a knowledge gap in the forensic science education of lawyers. In law schools across the country, there is minimal curriculum requirements focused on educating law students in forensic science. Of the top 50 law schools in the U.S., 20% offer a forensic science elective. After the rigor of law school, there is no requirement set to educate lawyers in forensic science. In fact, based on survey responses, 51% of criminal lawyers do not take part in forensic science continuing education programs. Though educators as well as professionals have voiced the need for …


Plugging The Pipeline: Prosecutors And Educators Collaborating To Eliminate The School To Prison Pipeline, Hunter Taylor, Gerry Lopez, Evelyn Essenwanger, Hunter Taylor Mar 2020

Plugging The Pipeline: Prosecutors And Educators Collaborating To Eliminate The School To Prison Pipeline, Hunter Taylor, Gerry Lopez, Evelyn Essenwanger, Hunter Taylor

National Youth Advocacy and Resilience Conference

Ideal for law enforcement, educators, and all citizens working with youth at-risk, this unique presentation explains how prosecutors in one of the nation’s largest counties have engaged local school districts, community based organizations, and even ex-gang members to create an award winning Crime Prevention Unit designed to keep youth in the classroom and out of the criminal justice system.


Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D. Mar 2020

Drones: Where Does The National Airspace System Start?, Jason T. Lorenzon J.D.

National Training Aircraft Symposium (NTAS)

Unmanned Aerial Systems (UAS), Unmanned Aeronautical Vehicles (UAV), drones and Personal Aerial Vehicles (PAV) constitute the greatest technological advancement since the jet age. (Elaine Chao, Secretary of Transportation, October 26, 2017) This technological advancement has prompted significant public policy challenges and the need for new laws regarding navigable airspace. This proposal investigates how airspace used by drones will evolve given existing Constitutional and common law principals. These principals will influence the creation, development and modification of UAS airspace regulations by the Federal Aviation Administration (FAA).

Two critical but unanswered questions concerning the National Airspace System, are where does navigable airspace …


The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes Jan 2020

The Cyberworld And Human Trafficking: A Double-Edged Sword, Bridget Dukes

Cybersecurity Undergraduate Research Showcase

This report examines the advantages and disadvantages associated with the growth of technology within the United States, specifically how technology, digital literacy, and cybersecurity can be used to both facilitate and combat sex trafficking and sexual exploitation on the Internet. The first part of the report addresses trafficking statistics in the United States, as well as legal intervention the country has taken against this epidemic, including an explanation of the Trafficking Victims Prevention Act and the FOSTA-SESTA bill. The second part of the report addresses the online recruitment of buyers and sellers, as well as how the use of open-source …