Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 61 - 90 of 232

Full-Text Articles in Law

Agenda: Flpma Turns 40, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment Oct 2016

Agenda: Flpma Turns 40, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment

FLPMA Turns 40 (October 21)

The Bureau of Land Management (BLM) administers approximately 245 million acres of our public lands and yet, for most of our nation's history, these lands seemed largely destined to end up in private hands. Even when the Taylor Grazing Act of 1934 ushered in an important era of better managing public grazing districts and "promoting the highest use of the public lands," such use of our public lands still was plainly considered temporary, "pending its final disposal." It was not until 1976 with the passage of the Federal Land Policy and Management Act (FLPMA) that congress adopted a policy that …


Slides: Flpma In Its Historical Context, John D. Leshy Oct 2016

Slides: Flpma In Its Historical Context, John D. Leshy

FLPMA Turns 40 (October 21)

Presenter: John D. Leshy, Sunderland Distinguished Professor of Law Emeritus, U.C. Hastings College of the Law

36 slides

This session traces the history of FLPMA including, among other things, its legislative, administrative, and historical antecedents, including for example, the Public Land Law Review Commission’s 1970 report, One Third of Our Nation’s Lands. It then considers FLPMA’s unique public lands policies and requirements and how they are reflected in the BLM’s management of public lands today.

See: https://www.nps.gov/parkhistory/online_books/blm/history/contents.htm


On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin Oct 2016

On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin

Andrew Chin

No abstract provided.


Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Oct 2016

Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Annual ADFSL Conference on Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Oct 2016

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Annual ADFSL Conference on Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Oct 2016

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


Agenda: Winter, Wilderness & Climate: Threats & Solutions, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment, The Wilderness Society, Protect Our Winters Oct 2016

Agenda: Winter, Wilderness & Climate: Threats & Solutions, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment, The Wilderness Society, Protect Our Winters

Winter, Wilderness, and Climate--Threats and Solutions (October 12)

In partnership with the Getches-Wilkinson Center, join The Wilderness Society and Protect Our Winters for an interactive presentation about energy development and climate impacts on public lands.

This event was held on Wednesday, October 12, 2016, 5:30 - 7:30 p.m., in the University of Colorado Law School, Wolf Law Building, Wittemyer Courtroom.


Slides: Winter, Wilderness & Climate: Threats & Solutions, Jim Ramey, Lindsay Bourgoine Oct 2016

Slides: Winter, Wilderness & Climate: Threats & Solutions, Jim Ramey, Lindsay Bourgoine

Winter, Wilderness, and Climate--Threats and Solutions (October 12)

Presenters:

Jim Ramey, The Wilderness Society

Lindsay Bourgoine, Protect Our Winters

56 slides


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor Oct 2016

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Proceedings on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Detangling The Interrelationships Between Self-Regulation And Ill-Structured Problem Solving In Problem-Based Learning, Xun Ge, Victor Law, Kun Huang Oct 2016

Detangling The Interrelationships Between Self-Regulation And Ill-Structured Problem Solving In Problem-Based Learning, Xun Ge, Victor Law, Kun Huang

Interdisciplinary Journal of Problem-Based Learning

One of the goals for problem-based learning (PBL) is to promote self-regulation. Although self-regulation has been studied extensively, its interrelationships with ill-structured problem solving have been unclear. In order to clarify the interrelationships, this article proposes a conceptual framework illustrating the iterative processes among problem-solving stages (i.e., problem representation and solution generation) and self-regulation phases (i.e., planning, execution, and reflection). The dynamics of the interrelationships are further illustrated with three ill-structured problem-solving examples in different domains (i.e., information problem solving, historical inquiry, and science inquiry). The proposed framework contributes to research and practice by providing a new lens to examine …


Working Waterfronts: On History, Conflicts, And Finding A Balance Case Studies Of The Lynnhaven River, The Ware River, And The Eastern Shore Of Virginia, Noah Trombly, Derek Van De Walle, Chelsea Wilkins Oct 2016

Working Waterfronts: On History, Conflicts, And Finding A Balance Case Studies Of The Lynnhaven River, The Ware River, And The Eastern Shore Of Virginia, Noah Trombly, Derek Van De Walle, Chelsea Wilkins

Virginia Coastal Policy Center

No abstract provided.


Getches-Wilkinson Center Newsletter, Fall 2016, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment Oct 2016

Getches-Wilkinson Center Newsletter, Fall 2016, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment

Getches-Wilkinson Center for Natural Resources, Energy, and the Environment Newsletter (2013-)

No abstract provided.


Santa Clara Magazine, Volume 57 Number 4, Fall 2016, Santa Clara University Oct 2016

Santa Clara Magazine, Volume 57 Number 4, Fall 2016, Santa Clara University

Santa Clara Magazine

3 - MISSION MATTERS

4 - THE BEST RUGBY TEAM EVER. By Sam Scott '96.

6 - QUESTIONS


Hampton Roads Sanitation District’S Sustainable Water Initiative For Tomorrow Proposal, Patrick Harner, Alexa Pecht, Emily Tucker Oct 2016

Hampton Roads Sanitation District’S Sustainable Water Initiative For Tomorrow Proposal, Patrick Harner, Alexa Pecht, Emily Tucker

Virginia Coastal Policy Center

No abstract provided.


Enhancing Public Engagement On Offshore Wind Energy Using Genius Loci: A Case Study From A Lake Michigan Coastal Community, Erik Edward Nordman, Daniel O'Keefe, Erika Arndt Sep 2016

Enhancing Public Engagement On Offshore Wind Energy Using Genius Loci: A Case Study From A Lake Michigan Coastal Community, Erik Edward Nordman, Daniel O'Keefe, Erika Arndt

Erik Edward Nordman

We describe a novel approach to public engagement on offshore wind energy based on genius loci (“spirit of a place”). North America lacks offshore wind farms but they could be viable in the Great Lakes. Cultural ties between coastal Michigan, USA and the Netherlands offered opportunities to learn from the Dutch offshore wind experience. Residents from a Lake Michigan coastal community with Dutch heritage videoconferenced with a Dutch tourism specialist regarding the Egmond aan Zee offshore wind farm. Important differences and similarities between the regions emerged, including the clustering of technological expertise, tourism effects, and perspectives on working seascapes. Michigan …


Masthead Sep 2016

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Sep 2016

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Sep 2016

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White Sep 2016

A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White

Journal of Digital Forensics, Security and Law

This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.


Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington Sep 2016

Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington

Journal of Digital Forensics, Security and Law

Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …


Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar Sep 2016

Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar

Journal of Digital Forensics, Security and Law

Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …


The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins Sep 2016

The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins

Journal of Digital Forensics, Security and Law

Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …


Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron Sep 2016

Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron

Journal of Digital Forensics, Security and Law

Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …


Table Of Contents Sep 2016

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


The Reduced Form Of Litigation Models And The Plaintiff's Win Rate, Jonah B. Gelbach Sep 2016

The Reduced Form Of Litigation Models And The Plaintiff's Win Rate, Jonah B. Gelbach

All Faculty Scholarship

In this paper I introduce what I call the reduced form approach to studying the plaintiff's win rate in litigation selection models. A reduced form comprises a joint distribution of plaintiff's and defendant's beliefs concerning the probability that the plaintiff would win in the event a dispute were litigated; a conditional win rate function that tells us the actual probability of a plaintiff win in the event of litigation, given the parties' subjective beliefs; and a litigation rule that provides the probability that a case will be litigated given the two parties' beliefs. I show how models with very different-looking …


On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin Sep 2016

On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin

Journal of Intellectual Property Law

No abstract provided.


1956 Salinas River Basin Investigation, Bulletin No. 19 Sep 2016

1956 Salinas River Basin Investigation, Bulletin No. 19

State and Federal Documents Relating to Monterey and San Luis Obispo Counties

The February 1956 Salinas River Basin Investigation (State Water Resources Board Bulletin No. 19) contains an inventory of underground and surface water resources of the Salinas River Basin, estimates of present and probably ultimate water utilization, estimates of present and probably ultimate supplemental water requirements, and preliminary plans and cost estimates for local water development works and for works for possible importation of water from sources outside of the basin.


1904, Water Resources In Salinas, United States Department Of Interior, Homer Hamlin Sep 2016

1904, Water Resources In Salinas, United States Department Of Interior, Homer Hamlin

State and Federal Documents Relating to Monterey and San Luis Obispo Counties

The 1904 report pertains largely to that portion of the Salinas Valley lying within the boundaries of Monterey County. It describes the geography, topography, geology, climate factors and hydrology of the region discussing the methods of irrigation and irrigation systems, the extent of underground waters, and the possibility of extending irrigation by utilization of surface streams and impounding of flood waters.


1946 Salinas Basin Investigation Summary Report, Bulletin No. 52-B Sep 2016

1946 Salinas Basin Investigation Summary Report, Bulletin No. 52-B

State and Federal Documents Relating to Monterey and San Luis Obispo Counties

This joint 1946 18-month investigation of the Salinas Basin by the State Department of Water Resources and the County of Monterey deals with conditions in the lower Salinas River Basin near Monterey Bay due to saline water intrusion into the groundwater supply that was utilized for irrigation, domestic and industrial purposes. The report discusses the history of the basin, a description of the Salinas Valley, sub-basins, inflow and outflow, crops, wells, percolation, underground hydrology, quality of water, evaluation of water problem, methods of conservation, proposed solution and legal considerations.