Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Engineering

Journal

2018

Articles 1 - 13 of 13

Full-Text Articles in Law

An Examination Of The Death Penalty, Alexandra N. Kremer Dec 2018

An Examination Of The Death Penalty, Alexandra N. Kremer

The Downtown Review

The death penalty, or capital punishment, is the use of execution through hanging, beheading, drowning, gas chambers, lethal injection, and electrocution among others in response to a crime. This has spurred much debate on whether it should be used for reasons such as ethics, revenge, economics, effectiveness as a deterrent, and constitutionality. Capital punishment has roots that date back to the 18th century B.C., but, as of 2016, has been abolished in law or practice by more than two thirds of the world’s countries and several states within the United States. Here, the arguments for and against the death …


A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman Oct 2018

A New Framework For Securing, Extracting And Analyzing Big Forensic Data, Hitesh Sachdev, Hayden Wimmer, Lei Chen, Carl Rebman

Journal of Digital Forensics, Security and Law

Finding new methods to investigate criminal activities, behaviors, and responsibilities has always been a challenge for forensic research. Advances in big data, technology, and increased capabilities of smartphones has contributed to the demand for modern techniques of examination. Smartphones are ubiquitous, transformative, and have become a goldmine for forensics research. Given the right tools and research methods investigating agencies can help crack almost any illegal activity using smartphones. This paper focuses on conducting forensic analysis in exposing a terrorist or criminal network and introduces a new Big Forensic Data Framework model where different technologies of Hadoop and EnCase software are …


The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips Oct 2018

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips

Dickinson Law Review (2017-Present)

Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.

Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …


Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels Aug 2018

Yelp’S Review Filtering Algorithm, Yao Yao, Ivelin Angelov, Jack Rasmus-Vorrath, Mooyoung Lee, Daniel W. Engels

SMU Data Science Review

In this paper, we present an analysis of features influencing Yelp's proprietary review filtering algorithm. Classifying or misclassifying reviews as recommended or non-recommended affects average ratings, consumer decisions, and ultimately, business revenue. Our analysis involves systematically sampling and scraping Yelp restaurant reviews. Features are extracted from review metadata and engineered from metrics and scores generated using text classifiers and sentiment analysis. The coefficients of a multivariate logistic regression model were interpreted as quantifications of the relative importance of features in classifying reviews as recommended or non-recommended. The model classified review recommendations with an accuracy of 78%. We found that reviews …


Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam Jun 2018

Recommended Corrective Security Measures To Address The Weaknesses Identified Within The Shapash Nuclear Research Institute, Khadija Moussaid, Oum Keltoum Hakam

International Journal of Nuclear Security

The Shapash Nuclear Research Institute (SNRI) data book was issued by the International Atomic Energy Agency (IAEA) in 2013. The hypothetical facility data book describes the hypothetical site, which is divided into two areas: the low-security area, known as the administrative area, and the very high-security area, known as the protected area. The book contains detailed descriptions of each area’s safety and security measures, along with figures of multiple buildings in both areas, and also includes information about the site’s computer networks.

This paper aims to identify security weaknesses related to the institute’s location, the Administrative Area (AA), the Protected …


Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith May 2018

Ftc Regulating Cybersecurity Post Wyndham: An International Common Law Comparison On The Impact Of Regulation Of Cybersecurity, Andrew Z. R. Smith

Georgia Journal of International & Comparative Law

No abstract provided.


Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo Apr 2018

Developing Kenya’S Educational Capacity In Nuclear Security Through Nuclear Forensics Research, Hudson Kalambuka Angeyo

International Journal of Nuclear Security

Nuclear energy’s distinctive characteristics give rise to special educational requirements. These requirements are necessary to not only address the danger of nuclear proliferation, but also to build capacity for a secure nuclear fuel circle. In this paper, I assess the status of educational capacity in nuclear security both in response to, and in support of, Kenya’s nuclear power program. I highlight the nuclear security educational infrastructure’s key features in the context of nuclear power, noting the low capacity at Kenyan universities. I identify the steps required to ensure that the country’s dynamic nuclear regulatory infrastructural framework is used effectively to …


Hawai'i Wildlife Fund V. County Of Maui, Lowell J. Chandler Apr 2018

Hawai'i Wildlife Fund V. County Of Maui, Lowell J. Chandler

Public Land & Resources Law Review

In Hawai’i Wildlife Fund v. County of Maui, the Ninth Circuit held that the plain language of the Clean Water Act provides jurisdiction over indirect discharges of pollutants from a point source into groundwater that is shown to be connected to navigable waters. The court found that studies confirmed pollutants entering the Pacific Ocean were fairly traceable to the County of Maui’s sewage disposal wells. In affirming the district court’s ruling, the Ninth Circuit held that Maui County violated the Clean Water Act by discharging pollutants into a navigable water without the required permit. The court also concluded the …


Definite Indefiniteness Of "Molecular Weight" As A Claim Term For Polymer-Related Patents, Ping-Hsun Chen Mar 2018

Definite Indefiniteness Of "Molecular Weight" As A Claim Term For Polymer-Related Patents, Ping-Hsun Chen

The Journal of Business, Entrepreneurship & the Law

The molecular weight of a polymer is not just a number for a single molecule. In fact, molecular weight measurement is based on a large volume of molecules of the same polymer. Due to the non-uniformity of molecular weights, there are several methods to measure an “average molecular weight” of a polymer. Unfortunately, the Federal Circuit in Teva Pharms. USA, Inc. v. Sandoz, Inc., 789 F.3d 1335 (Fed. Cir. 2015), held that the term “molecular weight” in several polymer claims was indefinite, because the term could mean either peak average molecular weight, number average molecular weight, or weight average molecular …


Using Nvivo™ For Literature Reviews: The Eight Step Pedagogy (N7+1), Maureen M. O'Neill Dr, Sarah R. Booth Mrs, Janeen Therese Lamb Phd Mar 2018

Using Nvivo™ For Literature Reviews: The Eight Step Pedagogy (N7+1), Maureen M. O'Neill Dr, Sarah R. Booth Mrs, Janeen Therese Lamb Phd

The Qualitative Report

While a literature review is a necessary milestone to be completed by all researchers in a timely and efficient manner, it is often one of the most difficult aspects of the research journey. Moreover, traditional approaches often leave novice researchers, to struggle with the conceptualisation of their literature review, now complicated by the overwhelming quantity of research available online. This paper presents a rationale the use of Qualitative Data Analysis Software (QDAS) programs for literature reviews. QDAS tools allow the researcher to explore large amounts of textual documents to see patterns. These programs are often overlooked by novice researchers due …


The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska Mar 2018

The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska

International Journal of Nuclear Security

There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known for its …


Assessment And Comparison Of Aviation Manufacturing Industries Throughout Mexico And Brazil, Omar E. Morsi, Kelly A. Whealan-George, Aaron D. Clevenger Jan 2018

Assessment And Comparison Of Aviation Manufacturing Industries Throughout Mexico And Brazil, Omar E. Morsi, Kelly A. Whealan-George, Aaron D. Clevenger

International Journal of Aviation, Aeronautics, and Aerospace

This literature review serves to provide insight and understanding in regards to the evolving aviation manufacturing industry throughout the globe and more specifically, Mexico and Brazil. Increased demand for aircraft units both in the commercial and private sectors have led to unprecedented expansions in aircraft manufacturing across the industry. In order to illuminate certain potentials and current growth levels of such industries, this review will delve into an array of information and specifications in regards to economic, political, and cultural influences throughout both Mexican and Brazilian markets respectively. In conclusion, the review will identify the transformation of an aviation manufacturing …


Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain Jan 2018

Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain

Catholic University Journal of Law and Technology

In today’s technological landscape, computer programs are one of the most highly complex and popular inventions. However, they still receive little or sometimes no legal protection. As a consequence, programmers are reluctant to create new programs, discouraging innovation and preventing the public to benefit from using these inventions. If the court does afford them copyright protection, they may still not receive legal damages for copyright infringement because the court would not consider their program registered under the Copyright Act of 1976.

This Comment argues for greater copyright protection for programs by disregarding the merger doctrine, which does not provide protection …