Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- 21st Century Economy (1)
- AIDS (1)
- Balancing test (1)
- BlueNext Exchange (1)
- CO2 (1)
-
- California (1)
- Carousel fraud (1)
- Civil rights (1)
- Climate Spot Exchange (1)
- Computer generated simulation (1)
- Criminal law (1)
- Criminalization. HIV testing and coun (1)
- Cyber crime (1)
- Evidence (1)
- HIV (1)
- Hearsay rule exceptions (1)
- Human rights (1)
- Jurisprudence (1)
- Kyoto Protocol (1)
- Law and film (1)
- Law and humanities (1)
- Law and literature (1)
- Law and policy (1)
- MTIC (1)
- Phantom-ware (1)
- Police misconduct litigation (1)
- Probative value (1)
- Rape (1)
- Relevance (1)
- Retail sales tax (1)
Articles 1 - 6 of 6
Full-Text Articles in Law
The Morphing Of Mtic Fraud: Vat Fraud Infects Tradable Co2 Permits, Richard Thompson Ainsworth
The Morphing Of Mtic Fraud: Vat Fraud Infects Tradable Co2 Permits, Richard Thompson Ainsworth
Faculty Scholarship
Missing trader intra-community (MTIC) fraud has been slowly morphing from cell phones and computer chips to other commodities. In the last few months however MTIC made a dramatic appearance in tradable CO2 permits. It closed exchanges and prompted France and the Netherlands to unilaterally change their tax treatment of CO2 trades. The UK has followed the French treatment in large measure. On Monday June 8, 2009 rumors of MTIC fraud in carbon emission permits closed the main European exchange for spot trading of European Union carbon emissions permits and Kyoto offsets. When BlueNext began trading permits again on Wednesday, June …
Cyber Civil Rights, Danielle K. Citron
Cyber Civil Rights, Danielle K. Citron
Faculty Scholarship
Social networking sites and blogs have increasingly become breeding grounds for anonymous online groups that attack women, people of color, and members of other traditionally disadvantaged groups. These destructive groups target individuals with defamation, threats of violence, and technology-based attacks that silence victims and concomitantly destroy their privacy. Victims go offline or assume pseudonyms to prevent future attacks, impoverishing online dialogue and depriving victims of the social and economic opportunities associated with a vibrant online presence. Attackers manipulate search engines to reproduce their lies and threats for employers and clients to see, creating digital "scarlet letters" that ruin reputations. Today's …
California Zappers: A Proposal For The Commission For The 21st Century Economy, Richard Thompson Ainsworth
California Zappers: A Proposal For The Commission For The 21st Century Economy, Richard Thompson Ainsworth
Faculty Scholarship
California has not uncovered a single instance of technology-assisted cash skimming - there are no zappers, and no phantomware in California. Is this because Californians are not skimming cash sales with technology, or is this because the California technology works so well that the fraud cannot be detected?
The record in foreign jurisdictions is reasonable clear. Automated sales suppression technology is widely used to skim cash sales, denying the state revenues from consumption taxes that have been paid by the consumer, reducing taxable business profits, and funding a cash hoard out of which unreported employee wages are paid. Government studies …
A Witness To Justice, Jessica Silbey
A Witness To Justice, Jessica Silbey
Faculty Scholarship
In the 1988 film The Accused, a young woman named Sarah Tobias is gang raped on a pinball machine by three men while a crowded bar watches. The rapists cut a deal with the prosecutor. Sarah's outrage at the deal convinces the assistant district attorney to prosecute members of the crowd that cheered on and encouraged the rape. This film shows how Sarah Tobias, a woman with little means and less experience, intuits that according to the law rape victims are incredible witnesses to their own victimization. The film goes on to critique what the right kind of witness would …
Protecting Hiv Positive Women’S Human’S Rights: Recommendations For The Obama Administration, Aziza Ahmed, Catherine Hanssens, Brook Kelly
Protecting Hiv Positive Women’S Human’S Rights: Recommendations For The Obama Administration, Aziza Ahmed, Catherine Hanssens, Brook Kelly
Faculty Scholarship
To bring the United States in line with prevailing human rights standards, its National HIV/AIDS Strategy will need to explicitly commit to a human rights framework when developing programmes and policies that serve the unaddressed needs of women. This paper focuses on two aspects of the institutionalized mistreatment of people with HIV: 1) the criminalization of their consensual sexual conduct; and 2) the elimination of informed and documented consensual participation in their diagnosis through reliance on mandatory and opt-out testing policies. More than half of US states have HIV-specific laws criminalizing the consensual sexual activity of people with HIV, regardless …
Analysis Of Videotape Evidence In Police Misconduct Cases, Martin A. Schwartz, Jessica Silbey, Jack Ryan, Gail Donoghue
Analysis Of Videotape Evidence In Police Misconduct Cases, Martin A. Schwartz, Jessica Silbey, Jack Ryan, Gail Donoghue
Faculty Scholarship
Many evidentiary issues arise with respect to the admission of videotape evidence and computer generated simulations at trial, and the authors of this Article address these issues as they arise in police misconduct cases. Professor Schwartz provides insight into and analysis of the evidentiary principles that govern the use of video and computer simulation evidence at trial in cases where police misconduct is at issue. His discussion first addresses the issues that concern the admissibility of videotape evidence, then discusses the role of a videotape on summary judgment, and lastly, analyzes evidentiary issues with respect to computer generated simulations.