Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Law

Fallibility + Unchecked Power = Trouble, C. Peter Erlinder Oct 2007

Fallibility + Unchecked Power = Trouble, C. Peter Erlinder

C. Peter Erlinder

No abstract provided.


La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva Jul 2007

La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva

Edward Ivan Cueva

La Cesión de Derechos en el Código Civil Peruano


Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva May 2007

Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva

Edward Ivan Cueva

No abstract provided.


Undermining Individual And Collective Citizenship: The Impact Of Felon Exclusion Laws On The African-American Community, S. David Mitchell Apr 2007

Undermining Individual And Collective Citizenship: The Impact Of Felon Exclusion Laws On The African-American Community, S. David Mitchell

S. David Mitchell

Felon exclusion laws are jurisdiction-specific, post-conviction statutory restrictions that prohibit convicted felons from exercising a host of legal rights, most notably the right to vote. The professed intent of these laws is to punish convicted felons equally without regard for the demographic characteristics of each individual, including race, class, or gender. Felon exclusion laws, however, have a disproportionate impact on African-American males and, by extension, on the residential communities from which many convicted felons come. Thus, felon exclusion laws not only relegate African-American convicted felons to a position of second-class citizenship, but the laws also diminish the collective citizenship of …


What Is Distinctive About Terrorism And Anti-Terrorism Law?, Matthew S. R. Palmer Jan 2007

What Is Distinctive About Terrorism And Anti-Terrorism Law?, Matthew S. R. Palmer

The Hon Justice Matthew Palmer

Criminal offending and terrorist offending are similar in quality – the acts which constitute such offending are similar, and should be subject to similar levels of protection of civil and political rights. This is how a democracy should respond to domestic terror threats. To the extent that we are particularly concerned about the motivation of terrorists in challenging the very maintenance of public order by a state, we should reflect that concern in the penalties we impose on such proven offending, not in giving in to the temptation of lower burdens of proof of the existence of the offending or …


Five Ways Computer Forensics Can Aid Discovery, Robert L. Kardell Jan 2007

Five Ways Computer Forensics Can Aid Discovery, Robert L. Kardell

Robert L Kardell

No abstract provided.


The Lessons Of Fraud, Robert L. Kardell Jan 2007

The Lessons Of Fraud, Robert L. Kardell

Robert L Kardell

No abstract provided.


From Due Process To Crime Control: The Decline Of Liberalism In The Irish Criminal Justice System, Liz Campbell Jan 2007

From Due Process To Crime Control: The Decline Of Liberalism In The Irish Criminal Justice System, Liz Campbell

Liz Campbell

At all stages of the Irish criminal process, from pretrial detention and investigation, through the courthearing and at sentencing, a shift in focus from the due process rights of the accused towards the crime control aims of the State is apparent. Due process values, which seek to establish a degree of parity between the State and the accused, are increasingly seen in popular and political discourse as inconveniences to be overcome, rather than vital safeguards.


The Crime, The Case, The Killer Cocktail: Why Maryland's Capital Punishment Procedure Constitutes Cruel And Unusual Punishment, Matthew E. Feinberg Jan 2007

The Crime, The Case, The Killer Cocktail: Why Maryland's Capital Punishment Procedure Constitutes Cruel And Unusual Punishment, Matthew E. Feinberg

Matthew E Feinberg

Recent challenges to the death penalty argue that the anesthetic used in a majority of executions can wear off prior to death. Eye-witness accounts provide evidence that often, executions have not been completed painlessly, even when procedures are presumably completed in conformance with protocol. The lack of experience and training of Maryland's execution team produces a risk of botched executions. Finally, the drug cocktail is so powerful that it has been banned for use on animals due to the intense pain it inflicts. Each of these four concerns present a significant risk of excruciating pain for the inmate. The culmination …


Law Enforcement Responses To Trafficking In Persons: Challenges And Emerging Good Practice, Fiona M. David Ms Jan 2007

Law Enforcement Responses To Trafficking In Persons: Challenges And Emerging Good Practice, Fiona M. David Ms

Fiona David

In recent years, the Australian Government has committed significant resources to combating trafficking in persons. Within this larger anti-trafficking effort, the community sector, law enforcement, prosecutors, health professionals and members of the community all have an important role to play. As each sector comes to terms with the reality of trafficking in Australia, it is important that emerging challenges and possible solutions are identified. This paper focuses on the challenges that may confront law enforcement officials in any country in their efforts to detect trafficking, identify victims, investigate offences and contribute to the successful prosecution of offenders. Drawing on international …


Economic Models Of Crime And Punishment, John J. Donohue Jan 2007

Economic Models Of Crime And Punishment, John J. Donohue

John Donohue

No abstract provided.


Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson Jan 2007

Border Confidential: Why Searches Of Laptop Computers At The Border Should Require Reasonable Suspicion, John W. Nelson

John W. Nelson

Our laptops are capable of containing large amounts of personal, private, intimate, and confidential information. At the same time, the power of the government to search us and our possessions is at its zenith during a border crossing. How should our laptops be treated during these border crossings?

This Note examines the background of the border search exception and the privacy interests we each have in our laptop computers. This Note argues that searches of our laptop computers should be viewed as highly intrusive in nature because of the ability to quickly sort through vast amounts of intimate and private …


The Personal Is Political--And Economic: Rethinking Domestic Violence, Deborah M. Weissman Jan 2007

The Personal Is Political--And Economic: Rethinking Domestic Violence, Deborah M. Weissman

Deborah M. Weissman

This Article seeks to expand the scope of the domestic violence discourse within the context of the theory and practice of legal strategies. The intent is to shift the analytical parameters beyond the criminal justice system to include the political economy of everyday experiences of households. Such a paradigm shift examines the conditions of the private sphere as a function of the circumstances of public realms. It considers domestic violence by linking it to the structural transformations of the U.S. economy during recent years. It assesses domestic violence from the perspective of the daily life of men and women who …


Self-Defense In Asian Religions, David B. Kopel Jan 2007

Self-Defense In Asian Religions, David B. Kopel

David B Kopel

This Article investigates the attitudes of six Far Eastern religions - Confucianism, Taoism, Hinduism, Sikhism, Jainism, and Buddhism - towards the legitimacy of the use of force in individual and collective contexts. Self-defense is strongly legitimated in the theory and practice of the major Far Eastern religions. The finding is consistent with natural law theory that some aspects of the human personality, including the self-defense instinct, are inherent in human nature, rather than being entirely determined by culture.