Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Law

BLR

Administrative Law

Articles 1 - 14 of 14

Full-Text Articles in Law

Yukos Risk: The Double Edged Sword, Joseph Tanega, Dmitry Gololobov Jan 2007

Yukos Risk: The Double Edged Sword, Joseph Tanega, Dmitry Gololobov

ExpressO

Abstract The article focuses on elucidating the meaning of Yukos risk mainly in terms of corporate bankruptcy litigation in multiple jurisdictions, including, the U.S., U.K., The Netherlands, and Russia. The emphasis is on understanding the various legal theories and the court decisions reached so far in this continuing legal saga.


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Searches & The Misunderstood History Of Suspicion & Probable Cause: Part One, Fabio Arcila Sep 2006

Searches & The Misunderstood History Of Suspicion & Probable Cause: Part One, Fabio Arcila

ExpressO

This article, the first of a two-part series, argues that during the Framers’ era many if not most judges believed they could issue search warrants without independently assessing the adequacy of probable cause, and that this view persisted even after the Fourth Amendment became effective. This argument challenges the leading originalist account of the Fourth Amendment, which Professor Thomas Davies published in the Michigan Law Review in 1999.

The focus in this first article is upon an analysis of the common law and how it reflected the Fourth Amendment’s restrictions. Learned treatises in particular, and to a lesser extent a …


Searches And The Misunderstood History Of Suspicion And Probable Cause: Part One, Fabio Arcila Aug 2006

Searches And The Misunderstood History Of Suspicion And Probable Cause: Part One, Fabio Arcila

ExpressO

This article, the first of a two-part series, argues that during the Framers’ era many if not most judges believed they could issue search warrants without independently assessing the adequacy of probable cause, and that this view persisted even after the Fourth Amendment became effective. This argument challenges the leading originalist account of the Fourth Amendment, which Professor Thomas Davies published in the Michigan Law Review in 1999.

The focus in this first article is upon an analysis of the common law and how it reflected the Fourth Amendment’s restrictions. Learned treatises in particular, and to a lesser extent a …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


Review Essay: Using All Available Information, Max Huffman May 2006

Review Essay: Using All Available Information, Max Huffman

ExpressO

This is a review essay entitled “Using All Available Information,” in which I review and comment on Justice Stephen Breyer’s new book, Active Liberty: Interpreting Our Democratic Constitution, published in September 2005. Justice Breyer’s book, adapted from the Tanner Lectures given in 2005 at Harvard Law School, serves partly as a response to Justice Scalia’s 1997 volume A Matter of Interpretation: Federal Courts and the Law. I review Justice Breyer’s book in part by comparison to and contrast with Justice Scalia’s. I propose that much about Justice Breyer’s interpretive philosophy, which centers on determining the “purposes” of texts and interpreting …


Refugee Security And The Organizational Logic Of Legal Mandates, Mariano-Florentino Cuellar Feb 2006

Refugee Security And The Organizational Logic Of Legal Mandates, Mariano-Florentino Cuellar

ExpressO

While the refugee protection system is one of international law’s most recognizable features, it routinely places massive numbers of refugees in camps in the developing world, where they face chronic threats to their physical security from crime and disorder, coercion, and military attacks. Yet key actors responsible for refugee protection, including host states, advanced industrialized countries, and the United Nations High Commissioner for Refugees (UNHCR), generally have failed to prioritize refugee security. This article asks: (1) Why? (2) What have been the consequences? (3) And what do these answers reveal about how organizations carry out legal mandates in complicated political …


Separation Of Powers And The Criminal Law, Rachel E. Barkow Sep 2005

Separation Of Powers And The Criminal Law, Rachel E. Barkow

ExpressO

Scholars have written volumes about the separation of powers, but they have focused on the administrative state and have wholly ignored the criminal state. Judges, too, have failed to distinguish criminal from administrative matters. So, the conventional wisdom has been that whatever theory works for the administrative state should work for anything else, including crime. And because most scholars and judges have supported a flexible or functional approach to separation of powers in the regulatory sphere, they have failed to see a problem with the functional approach when it comes to criminal matters. Indeed, the Supreme Court has been even …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


Shifts In Policy And Power: Calculating The Consequences Of Increased Prosecutorial Power And Reduced Judicial Authority In Post 9/11 America, Chris Mcneil Aug 2005

Shifts In Policy And Power: Calculating The Consequences Of Increased Prosecutorial Power And Reduced Judicial Authority In Post 9/11 America, Chris Mcneil

ExpressO

Among many responses to the attacks of September 11, 2001, Congress and the states have shifted to the executive branch certain powers once held by the judicial branch. This article considers the impact of transferring judicial powers to prosecutorial officers, and compares the consequent increased powers of the prosecutor with those powers traditionally held by prosecutors in Japanese criminal courts. It considers the impact of removing from public view and judicial oversight many prosecutorial functions, drawing comparisons between the largely opaque Japanese prosecutorial roles and those roles now assumed in immigration and anti-terrorism laws, noting the need for safeguards not …


Organizational Misconduct: Beyond The Principal-Agent Model, Kimberly D. Krawiec Feb 2005

Organizational Misconduct: Beyond The Principal-Agent Model, Kimberly D. Krawiec

ExpressO

This article demonstrates that, at least since the adoption of the Organizational Sentencing Guidelines in 1991, the United States legal regime has been moving away from a system of strict vicarious liability toward a system of duty-based organizational liability. Under this system, organizational liability for agent misconduct is dependant on whether or not the organization has exercised due care to avoid the harm in question, rather than under traditional agency principles of respondeat superior. Courts and agencies typically evaluate the level of care exercised by the organization by inquiring whether the organization had in place internal compliance structures ostensibly designed …


The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi Nov 2004

The Law And Economics Of Cybersecurity: An Introduction, Mark F. Grady, Francesco Parisi

George Mason University School of Law Working Papers Series

One of the most controversial theoretical issues of our time is the governance of cybersecurity. Computer security experts, national security experts, and policy analysts have all struggled to bring meaningful analysis to cybersecurity; however, the discipline of law & economics has yet to be fully applied to the issue. This introduction presents work by leading national scholars who examine this complex national security challenge from a law and economics perspective. The focus spans from a discussion of pure market solutions to public-private issue analysis, providing a valuable basis for policy considerations concerning the appropriate governmental role on the issue of …


Rethinking Public Engagement In The Administrative State, Mariano-Florentino Cuellar Jan 2004

Rethinking Public Engagement In The Administrative State, Mariano-Florentino Cuellar

ExpressO

This Article presents an empirical, doctrinal, and theoretical critique of public engagement in the modern administrative state. The legitimacy of the administrative state depends on the claim that it provides opportunities for public engagement as well as a mechanism for expert scientific decisionmaking. A typical rulemaking proceeding lets experts make technical judgments about terrorism, transportation, or telecommunications subject to court review guarding against arbitrariness. The whole process is then enmeshed in a system that is supposed to provide engagement – and therefore democratic accountability -- through presidential appointments and control, congressional oversight, and the public notice-and-comment process. This existing approach …


National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock Oct 2003

National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock

ExpressO

In the past two years there have been serious calls for a national identity system whose centerpiece would be some form of national identity card. Such a system is seen mainly as a tool against terrorists, but also as a useful response to illegal immigration, identity theft, and electoral fraud. Both proponents and opponents have noted the potential constitutional problems of such an identity system, but as yet there has been no published legal analysis of these questions. This article aims to fill that gap by analyzing the Fourth and Fifth Amendment issues in two major features of any likely …