Open Access. Powered by Scholars. Published by Universities.®

Criminal Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Criminal Law

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Relational Contract Theory And Management Contracts: A Paradigm For The Application Of The Theory Of The Norms, Michael Diathesopoulos Jun 2010

Relational Contract Theory And Management Contracts: A Paradigm For The Application Of The Theory Of The Norms, Michael Diathesopoulos

Michael Diathesopoulos

This paper examines management contracts as a paradigm for the application of relational contracts theory and especially of the theory of contractual and relational norms. This theory, deriving from Macauley's implications, but structured and analysed by I.R. MacNeil gives us a framework for the explanation and understanding of contractual obligations and business relations' rules and practice. After presenting the key literature about the norms theory and especially defining the content of MacNeil's norms, we define management contracts as relations, characterised by a high relational element and we explain why, investigating all their features, which make them a suitable object for …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


An Economic Analysis Of The Private And Social Costs Of The Provision Of Cybersecurity And Other Public Security Goods, Bruce H. Kobayashi Apr 2005

An Economic Analysis Of The Private And Social Costs Of The Provision Of Cybersecurity And Other Public Security Goods, Bruce H. Kobayashi

George Mason University School of Law Working Papers Series

This paper examines the incentives of private actors to invest in cybersecurity. Prior analyses have examined investments in security goods, such as locks or safes that have the characteristics of private goods. The analysis in this paper extends this analysis to examine expenditures on security goods, such as information, that have the characteristics of public goods. In contrast to the private goods case, where individual uncoordinated security expenditures can lead to an overproduction of security, the public goods case can result in the underproduction of security expenditures, and incentives to free ride. Thus, the formation of collective organizations may be …