Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 20 of 20

Full-Text Articles in Social and Behavioral Sciences

Paper Dragon Thieves, J.S. Nelson Dec 2016

Paper Dragon Thieves, J.S. Nelson

J.S. Nelson

Developments in the law are making the corporate form more opaque and allowing the agents who animate it to escape individual accountability for their actions. The law now provides protection for agents to engage in widespread frauds that inflict massive harm on the public. This article challenges the academic orthodoxy that shareholder and director liability are enough to control agent behavior by developing a paper dragon analogy to focus on the importance of agents in corporate animation. Lack of agent accountability encourages the patterns of fraud that caused the financial crisis in which forty-five percent of the world’s wealth disappeared, …


Legislator Judges: The Warren Court And Justices' Use Of State Or International Policies In Criminal Procedure Cases, John Hermann Feb 2016

Legislator Judges: The Warren Court And Justices' Use Of State Or International Policies In Criminal Procedure Cases, John Hermann

John Hermann

The Warren Court went to great lengths to expand criminal defendants' rights, and in doing so it frequently relied on state majoritarian institutions' policies or international norms to accomplish its goals. The Court and justices were almost twice as likely to use state laws than international policies in their reasoning. The Court was also almost two-and-a-half times more likely to use state or international policies in its rationale when deciding in favor of the criminal defendant in relation to the state's interest.


The Corporate Shell Game, J.S. Nelson Dec 2015

The Corporate Shell Game, J.S. Nelson

J.S. Nelson

This Article identifies for the first time the hardening of the corporate shell. It provides compelling evidence that shell-hardening pushes and disguises the way that corporations and agents commit large-scale wrongdoing, and it traces the contributing legal streams that protect the agents who engage in this behavior. The only way to combat widespread frauds that inflict damage on the public is for the corporate shell to be-come less opaque.


Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael Oct 2015

Cloud Computing Data Breaches: A Socio-Technical Review Of Literature, David Kolevski, Katina Michael

Professor Katina Michael

As more and more personal, enterprise and government data, services and infrastructure moves to the cloud for storage and processing, the potential for data breaches increases. Already major corporations that have outsourced some of their IT requirements to the cloud have become victims of cyber attacks. Who is responsible and how to respond to these data breaches are just two pertinent questions facing cloud computing stakeholders who have entered an agreement on cloud services. This paper reviews literature in the domain of cloud computing data breaches using a socio-technical approach. Socio-technical theory encapsulates three major dimensions- the social, the technical, …


Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway Jun 2015

Identity Awareness And Re-Use Of Research Data In Veillance And Social Computing, Alexander Hayes, Stephen Mann, Amir Aryani, Susannah Sabine, Leigh Blackall, Pia Waugh, Stephan Ridgway

Alexander Hayes Mr.

Identity awareness of research data has been introduced as a requirement for open research, transparency and reusability of research data in the context of eScience. This requirement includes the capability of linking research data to researchers, research projects and publications, and identifying the license for the data. This connectivity between research data and other elements in research ecosystems is required in order to make the data available and reusable beyond the initial research. In this paper, we examine these capabilities in the domains of veillance and social computing. The dataset cases presented in this paper articulate the challenges that researchers …


Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole Apr 2015

Data In The Sciences At Colby College, A Case Study, Susan Westerberg Cole

Susan Westerberg Cole

A sabbatical project looked at the research data needs of science faculty at a small liberal arts college in order to determine potential library support services. I concluded that support needs to come from multiple campus units. This study highlighted the value of personal interviews to discover actual needs that had been unanticipated.


Beyond The Numbers: What You Can Say With Instruction Evaluation Data, Ashley Rosener, Barbara Harvey, Emily Frigo, James Gulvas, Anne Merkle Oct 2014

Beyond The Numbers: What You Can Say With Instruction Evaluation Data, Ashley Rosener, Barbara Harvey, Emily Frigo, James Gulvas, Anne Merkle

Barbara C. Harvey

While data driven decision making is a hot topic in librarianship, collecting, analyzing and interpreting data can be intimidating. Where and how to begin? Instruction librarians from Grand Valley State University will discuss how they scaled up from unshared, nonstandard evaluations to a standard form that would make participant perceptions of library instruction more widely accessible in order to make data driven decisions within the Instruction Program.


Sample Design Using Imperfect Design Data, Robert Clark Apr 2014

Sample Design Using Imperfect Design Data, Robert Clark

Robert Clark

A well-designed sampling plan can greatly enhance the information that can be produced from a survey. Once a broad sample design is identified, specific design parameters such as sample sizes and selection probabilities need to be chosen. This is typically achieved using an optimal sample design, which minimizes the variance of a key statistic or statistics, expressed as a function of design parameters and population characteristics, subject to a cost constraint. In practice, only imprecise estimates of population characteristics are available, but the effects of this variability are usually ignored. A general approach to sample allocation allowing for imprecise design …


Do You Know Where Your Data Are?, Susan Westerberg Cole Aug 2013

Do You Know Where Your Data Are?, Susan Westerberg Cole

Susan Westerberg Cole

Why should you be concerned with what happens to your data? What can librarians do to help?


Ignoring A Level In A Multilevel Model: Evidence From Uk Census Data, Mark Tramner, David Steel Jun 2013

Ignoring A Level In A Multilevel Model: Evidence From Uk Census Data, Mark Tramner, David Steel

Professor David Steel

Because of the inherent multilevel nature of census data, it is often appropriate to use multilevel models to investigate relationships between census variables. For a local population, the data available from the census allow a three-level nested model to be assumed, with an individual level (level 1), an enumeration district (ED) level (level 2), and a ward level (level 3). The consequences of ignoring one of the three levels in this model are assessed here theoretically. Empirical results, based on 1991 UK Census data, are also provided, comparing the variance components estimated from the three-level model with analyses based on …


Analysis Combining Survey And Geographically Aggregated Data, David Steel, Mark Tranmer, D Holt Jun 2013

Analysis Combining Survey And Geographically Aggregated Data, David Steel, Mark Tranmer, D Holt

Professor David Steel

This chapter contains sections titled: Introduction and Overview Aggregate and Survey Data Availability Bias and Variance of Variance Component Estimators Based on Aggregate and Survey Data Simulation Studies Using Auxiliary Variables to Reduce Aggregation Effects Conclusions Acknowledgements


Restricted Quasi-Score Estimating Functions For Sample Survey Data, Yan Lin, David Steel, Raymond Chambers Jun 2013

Restricted Quasi-Score Estimating Functions For Sample Survey Data, Yan Lin, David Steel, Raymond Chambers

Professor David Steel

This paper applies the theory of the quasi-likelihood method to model-based inference for sample surveys. Currently, much of the theory related to sample surveys is based on the theory of maximum likelihood. The maximum likelihood approach is available only when the full probability structure of the survey data is known. However, this knowledge is rarely available in practice. Based on central limit theory, statisticians are often willing to accept the assumption that data have, say, a normal probability structure. However, such an assumption may not be reasonable in many situations in which sample surveys are used. We establish a framework …


The Information In Aggregate Data, David Steel, Eric Beh, Raymond Chambers Jun 2013

The Information In Aggregate Data, David Steel, Eric Beh, Raymond Chambers

Professor David Steel

Ecological inference attempts to draw conclusions concerning individual-level relationships using data in the form of aggregates for groups in the population. The groups are often geographically defined. A fundamental statistical issue is how much information aggregate data contain concerning the relationships and parameters that we are trying to estimate. The information affects the standard errors of estimates as well as the power of any tests of hypothesis. It also affects the ability to tell, from the aggregate data, which different models under consideration are supported by the data. In this chapter likelihood-based methods are considered. We show in general how …


Filter Coordinations For Exploring Multi-Dimensional Data, Mark Sifer Dec 2012

Filter Coordinations For Exploring Multi-Dimensional Data, Mark Sifer

Dr Mark Sifer

No abstract provided.


Methods Of Analysis Of Illegal Immigration Into The United States, Vernon Briggs Mar 2012

Methods Of Analysis Of Illegal Immigration Into The United States, Vernon Briggs

Vernon M Briggs Jr

"A major barrier to the discussion of the scope and impact of illegal immigration on the American economy has been the inadequacy of existing data. Although data problems are not unique to this topic, the limited availability of macro-data on the size of the annual flows and of the accumulated stock of individuals as well as of micro-data on their influences on selected labor markets has been effectively used to forestall policy reform efforts."


Methods Of Analysis Of Illegal Immigration Into The United States, Vernon Briggs Mar 2012

Methods Of Analysis Of Illegal Immigration Into The United States, Vernon Briggs

Vernon M Briggs Jr

"A major barrier to the discussion of the scope and impact of illegal immigration on the American economy has been the inadequacy of existing data. Although data problems are not unique to this topic, the limited availability of macro-data on the size of the annual flows and of the accumulated stock of individuals as well as of micro-data on their influences on selected labor markets has been effectively used to forestall policy reform efforts."


Gathering The Student's Perception Of Teaching And Learning Environments: A Customisable Email Data Collection Tool, Robert Corderoy, Sandra Wills, Raymond Stace, Albert Ip Oct 2011

Gathering The Student's Perception Of Teaching And Learning Environments: A Customisable Email Data Collection Tool, Robert Corderoy, Sandra Wills, Raymond Stace, Albert Ip

Sandra Wills

No abstract provided.


The Special Case Of Scientific Data Sharing With Education, Jillian Wallis, Stasa Milojevic, Christine Borgman, William Sandoval May 2009

The Special Case Of Scientific Data Sharing With Education, Jillian Wallis, Stasa Milojevic, Christine Borgman, William Sandoval

Jillian C Wallis

No abstract provided.


Little Science Confronts The Data Deluge: Habitat Ecology, Embedded Sensor Networks, And Digital Libraries, Christine Borgman, Jillian Wallis, Noel Enyedy May 2009

Little Science Confronts The Data Deluge: Habitat Ecology, Embedded Sensor Networks, And Digital Libraries, Christine Borgman, Jillian Wallis, Noel Enyedy

Jillian C Wallis

e-Science promises to increase the pace of science via fast, distributed access to computational resources, analytical tools, and digital libraries. “Big science” fields such as physics and astronomy that collaborate around expensive instrumentation have constructed shared digital libraries to manage their data and documents, while “little science” research areas that gather data through hand-crafted fieldwork continue to manage their data locally. As habitat ecology researchers begin to deploy embedded sensor networks, they are confronting an array of challenges in capturing, organizing, and managing large amounts of data. The scientists and their partners in computer science and engineering make use of …


Adjusting Imperfect Data: Overview And Case Studies, Lars Vilhuber Nov 2005

Adjusting Imperfect Data: Overview And Case Studies, Lars Vilhuber

Lars Vilhuber

[Excerpt] In this chapter, instead of using the similarity in the cleaned datasets to investigate economic fundamentals, we focus on the differences in the underlying ‘dirty’ data. We describe two data elements that remain fundamentally different across countries, and the extent to which they differ. We then proceed to document some of the problems that affect longitudinally linked administrative data in general, and we describe some of the solutions analysts and statistical agencies have implemented, and some that they did not implement. In each case, we explain the reasons for and against implementing a particular adjustment, and explore, through a …