Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Law (7)
- Social and Behavioral Sciences (5)
- Computer Sciences (4)
- Library and Information Science (4)
- Business (3)
-
- Data Science (3)
- Law Librarianship (3)
- Arts and Humanities (2)
- Cataloging and Metadata (2)
- Earth Sciences (2)
- Engineering (2)
- Environmental Sciences (2)
- Medicine and Health Sciences (2)
- Applied Mathematics (1)
- Architecture (1)
- Astrophysics and Astronomy (1)
- Education (1)
- Graphics and Human Computer Interfaces (1)
- Information Literacy (1)
- Information Security (1)
- Intellectual Property Law (1)
- International Law (1)
- Legal Education (1)
- Mental and Social Health (1)
- Numerical Analysis and Scientific Computing (1)
- Oceanography and Atmospheric Sciences and Meteorology (1)
- Other Astrophysics and Astronomy (1)
- Other Computer Sciences (1)
- Keyword
-
- Law librarianship (2)
- Resource Conservation and Recovery Act (2)
- Analytics (1)
- Bessen (1)
- CSCA (1)
-
- Cataloging (1)
- Church-Turing thesis (1)
- Clean Power Plan (1)
- Climate change (1)
- Coal Combustion Residuals (1)
- Coal ash (1)
- Communication tools (1)
- Competitive intelligence (1)
- Computer (1)
- Computer Software (1)
- Computers (1)
- Copyright (1)
- Data (1)
- EPA and coal (1)
- End Software Patents Project (1)
- Environmental pollution (1)
- Georgia Department of Natural Resources (1)
- Global Climate (1)
- Global governance (1)
- Hazard waste determination (1)
- Hazardous waste (1)
- In re Bilski (1)
- Intellectual property (1)
- International law (1)
- Kanban (1)
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Physical Sciences and Mathematics
How Intelligent Ci Instruction Gives Law Students A Competitive Edge, Heather Simmons, Beau Steenken, Liz Whittington, Joshua Pluta
How Intelligent Ci Instruction Gives Law Students A Competitive Edge, Heather Simmons, Beau Steenken, Liz Whittington, Joshua Pluta
Presentations
"Competitive intelligence" (CI) is a term that gets bandied about across many sectors, but how exactly do law firms use it to further their business? Academics are aware of CI as a concept, but teaching students how to conduct competitive intelligence requires a more nuanced understanding of how it is actually used. In a discussion moderated by a newer academic librarian who will be teaching competitive intelligence for the first time, a firm librarian will share insights into how competitive intelligence can and should be used, and an academic librarian who regularly teaches competitive intelligence will offer tips on how …
Data, Stats, Go: Navigating The Intersections Of Cataloging, E-Resource, And Web Analytics Reporting, Rachel S. Evans, Wendy Moore, Jessica Pasquale, Andre Davison
Data, Stats, Go: Navigating The Intersections Of Cataloging, E-Resource, And Web Analytics Reporting, Rachel S. Evans, Wendy Moore, Jessica Pasquale, Andre Davison
Presentations
Do you trudge through gathering statistics at fiscal or calendar year-end? Do you wonder why you track certain things, thinking many seem outdated or irrelevant? Many places seem to keep counting certain statistics because "that's what they've always done." For e-resources, how do you integrate those with physical counts and reconcile the variations (updated e-resources versus re-cataloged physical items)? What about repository downloads and other web traffic? The quantity of stats that libraries track is staggering and keeps growing. This program will encourage attendees to stop and evaluate what and why they're gathering data and help identify possible alternatives to …
Linked Data For The Real World: Leveraging Metadata For Cataloging, Rachel S. Evans, Robin Fay, Linh Uong
Linked Data For The Real World: Leveraging Metadata For Cataloging, Rachel S. Evans, Robin Fay, Linh Uong
Presentations
Will the promise of linked data actually save us time? How will catalogers and machines work together to streamline recording of data and authority maintenance work, allowing catalogers and metadata practitioners to focus more on data stewardship and less on being data scribes? Will Real World Objects (RWOs) and linked data help bridge the gap between traditional cataloging and the larger semantic web communities of practice, ensuring that library metadata supports our users’ search behaviors, those FRBR User Tasks? Or will it just provide more maintenance work down the road? This session will explore the potential of linked data and …
The Future Of Space Governance, Melissa J. Durkee
The Future Of Space Governance, Melissa J. Durkee
Scholarly Works
Fifty years after the first moonwalk, the prospect for a new set of multilateral agreements governing outer space is remote, yet the legal questions raised by activity in space are mounting. With little prospect of new treaties, nations will need to make do with existing treaty law, generate customary rules to govern new applications, or develop forms of sub-legal understanding and cooperation. This special conference issue of the Georgia Journal of International and Comparative Law addresses these questions.
“Sorry I Didn’T Hear You.” The Ethics Of Voice Computing And Ai In High Risk Mental Health Populations, Fazal Khan, Christopher Villongco
“Sorry I Didn’T Hear You.” The Ethics Of Voice Computing And Ai In High Risk Mental Health Populations, Fazal Khan, Christopher Villongco
Scholarly Works
This article examines the ethical and policy implications of using voice computing and artificial intelligence to screen for mental health conditions in low income and minority populations. Mental health is unequally distributed among these groups, which is further exacerbated by increased barriers to psychiatric care. Advancements in voice computing and artificial intelligence promise increased screening and more sensitive diagnostic assessments. Machine learning algorithms have the capacity to identify vocal features that can screen those with depression. However, in order to screen for mental health pathology, computer algorithms must first be able to account for the fundamental differences in vocal characteristics …
Project Management Madness: 3 Key Programs For Communication, Personal Tasks And Large Projects, Rachel S. Evans
Project Management Madness: 3 Key Programs For Communication, Personal Tasks And Large Projects, Rachel S. Evans
Presentations
No matter what member of a team you are, be it content editor, web designer, database manager or systems administrator, getting things done and meeting goals depends largely on how you communicate with one another, handle your time and effectively collaborate on small and big projects. This session will use our own team's preferred platforms to show specific examples of how we are managing our taskflow across three different programs to tackle business as usual, short and long term work, and major special projects.
The three programs that will be compared for pros, cons, and their integration with one another …
No One Likes An Ash Hole: Advocating For A Management Scheme That Prioritizes Beneficial Utilization Of Coal Ash In The United States And Georgia Through Domestic And International Comparisons, Ethan Keith Norris
Georgia Journal of International & Comparative Law
No abstract provided.
Is The Paris Agreement Already Poised For Failure? - Discerning How Impactful The Clean Power Plan's Fate Is On The Latest Global Climate Initiative, Shawn Eric Mckenzie
Is The Paris Agreement Already Poised For Failure? - Discerning How Impactful The Clean Power Plan's Fate Is On The Latest Global Climate Initiative, Shawn Eric Mckenzie
Georgia Journal of International & Comparative Law
No abstract provided.
Hack The Planet! -- Cybersecurity Tips To Keep You, Your Data, And Your Clients Safe, Jason Tubinis
Hack The Planet! -- Cybersecurity Tips To Keep You, Your Data, And Your Clients Safe, Jason Tubinis
Continuing Legal Education Presentations
It is really easy to make you, your practice, and your clients safe from being the victims of a cyber-crime. This paper will discuss some tips, tricks, and considerations you can implement quickly, safely, and on the cheap.
These are relatively simple suggestions, though. You should be able to implement most of these practices within an hour, and while they will save you from the most common security flaws Bad Guys are looking to exploit.
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
Journal of Intellectual Property Law
No abstract provided.
Hazardous Waste Determination And Government Enforcement Actions In The Resource Conservation And Recovery Act And The Law No. 24051: Comparison Between The United States And Argentina, Eduardo Jose Conghos
Hazardous Waste Determination And Government Enforcement Actions In The Resource Conservation And Recovery Act And The Law No. 24051: Comparison Between The United States And Argentina, Eduardo Jose Conghos
LLM Theses and Essays
The incremental generation and disposal of hazardous waste, causing severe environmental pollution, has become one the world’s most important ecological problems starting with the Stockholm Conference in 1972. This paper examines two legislative reactions to pollution caused by hazardous wastes in the United States, under the Resource Conservation and Recovery Act 1976 (RCRA), and Argentina, in Law No. 24051. This paper makes a comparative analysis of the material provisions of both the RCRA and the Law with emphasis on the tools and actions provided for the enforcement of the RCRA and the Law. The paper concludes that the RCRA and …
Copyright Protection Of Software, Severine Desimpelaere
Copyright Protection Of Software, Severine Desimpelaere
LLM Theses and Essays
Computer technology has developed within the last decades with many advancements which require intellectual property protections. This thesis addresses the need for the legal protection of software by the vast body of copyright laws. This thesis examines the history, nature, textual and practical compositions of copyright laws and their adaptability to computer technology. The thesis further analyses the scope of copyright protection with emphasis on the Computer Software Copyright Act of 1980 (CSCA), the regime of international conventions for the protection of software as well as other statutory protections for the owners and users of the software. The thesis concludes …