Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (65)
- University of Colorado Law School (54)
- University of Tennessee, Knoxville (32)
- William & Mary Law School (16)
- Selected Works (11)
-
- California State University, Monterey Bay (10)
- University of Pennsylvania Carey Law School (5)
- Maurer School of Law: Indiana University (4)
- Florida A&M University College of Law (3)
- Santa Clara University (3)
- Kennesaw State University (2)
- Purdue University (2)
- SIT Graduate Institute/SIT Study Abroad (2)
- Salve Regina University (2)
- University of Pittsburgh School of Law (2)
- Brigham Young University Law School (1)
- Claremont Colleges (1)
- DePauw University (1)
- Duke Law (1)
- Emory University School of Law (1)
- Kansas State University Libraries (1)
- Roger Williams University (1)
- SJ Quinney College of Law, University of Utah (1)
- Singapore Management University (1)
- St. Mary's University (1)
- Stephen F. Austin State University (1)
- Texas Southern University (1)
- Union College (1)
- University of Georgia School of Law (1)
- University of Kentucky (1)
- Keyword
-
- Australia (14)
- California (13)
- Groundwater (11)
- New Mexico (10)
- Arizona (9)
-
- Water rights (9)
- Agriculture (8)
- Irrigation (8)
- New South Wales Aboriginal Land Council (7)
- Recreation (7)
- United States (7)
- Water supply (7)
- Colorado (6)
- Environment (6)
- Implementation (6)
- Intellectual property (6)
- New South Wales (6)
- Water quality (6)
- Aboriginal people (5)
- Climate change (5)
- Colorado River Basin (5)
- Cwp (5)
- Digital forensics (5)
- Murray-Darling Basin Authority (5)
- NSWALC (5)
- NWI (5)
- Oregon (5)
- Privacy (5)
- South Australia (5)
- Sustainability (5)
- Publication
-
- Journal of Digital Forensics, Security and Law (43)
- International Journal of Nuclear Security (32)
- Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10) (25)
- Annual ADFSL Conference on Digital Forensics, Security and Law (21)
- Indigenous Water Justice Symposium (June 6) (12)
-
- Books, Reports, and Studies (10)
- William & Mary Environmental Law and Policy Review (9)
- Tracy Mitrano (6)
- State and Federal Documents Relating to Monterey and San Luis Obispo Counties (5)
- Virginia Coastal Policy Center (5)
- All Faculty Scholarship (4)
- Individual Ranchos in Monterey and SLO Counties (4)
- Articles by Maurer Faculty (3)
- Holly Doremus (3)
- Santa Clara Magazine (3)
- Book Chapters (2)
- FLPMA Turns 40 (October 21) (2)
- Getches-Wilkinson Center for Natural Resources, Energy, and the Environment Newsletter (2013-) (2)
- Independent Study Project (ISP) Collection (2)
- KSU Proceedings on Cybersecurity Education, Research and Practice (2)
- Virginia Coastal Policy Center Annual Conference (2)
- Winter, Wilderness, and Climate--Threats and Solutions (October 12) (2)
- A Celebration of the Work of Charles Wilkinson (Martz Winter Symposium, March 10-11) (1)
- American Period Maps (1)
- Andrew Chin (1)
- BYU Law Review (1)
- Biostatistics Faculty Publications (1)
- Erik Edward Nordman (1)
- Faculty Articles (1)
- Faculty Scholarship (1)
- Publication Type
- File Type
Articles 61 - 90 of 232
Full-Text Articles in Law
Agenda: Flpma Turns 40, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment
Agenda: Flpma Turns 40, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment
FLPMA Turns 40 (October 21)
The Bureau of Land Management (BLM) administers approximately 245 million acres of our public lands and yet, for most of our nation's history, these lands seemed largely destined to end up in private hands. Even when the Taylor Grazing Act of 1934 ushered in an important era of better managing public grazing districts and "promoting the highest use of the public lands," such use of our public lands still was plainly considered temporary, "pending its final disposal." It was not until 1976 with the passage of the Federal Land Policy and Management Act (FLPMA) that congress adopted a policy that …
Slides: Flpma In Its Historical Context, John D. Leshy
Slides: Flpma In Its Historical Context, John D. Leshy
FLPMA Turns 40 (October 21)
Presenter: John D. Leshy, Sunderland Distinguished Professor of Law Emeritus, U.C. Hastings College of the Law
36 slides
This session traces the history of FLPMA including, among other things, its legislative, administrative, and historical antecedents, including for example, the Public Land Law Review Commission’s 1970 report, One Third of Our Nation’s Lands. It then considers FLPMA’s unique public lands policies and requirements and how they are reflected in the BLM’s management of public lands today.
See: https://www.nps.gov/parkhistory/online_books/blm/history/contents.htm
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
Andrew Chin
No abstract provided.
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota
Annual ADFSL Conference on Digital Forensics, Security and Law
With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier
Annual ADFSL Conference on Digital Forensics, Security and Law
Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.
The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen
Annual ADFSL Conference on Digital Forensics, Security and Law
One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …
Agenda: Winter, Wilderness & Climate: Threats & Solutions, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment, The Wilderness Society, Protect Our Winters
Agenda: Winter, Wilderness & Climate: Threats & Solutions, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment, The Wilderness Society, Protect Our Winters
Winter, Wilderness, and Climate--Threats and Solutions (October 12)
In partnership with the Getches-Wilkinson Center, join The Wilderness Society and Protect Our Winters for an interactive presentation about energy development and climate impacts on public lands.
This event was held on Wednesday, October 12, 2016, 5:30 - 7:30 p.m., in the University of Colorado Law School, Wolf Law Building, Wittemyer Courtroom.
Slides: Winter, Wilderness & Climate: Threats & Solutions, Jim Ramey, Lindsay Bourgoine
Slides: Winter, Wilderness & Climate: Threats & Solutions, Jim Ramey, Lindsay Bourgoine
Winter, Wilderness, and Climate--Threats and Solutions (October 12)
Presenters:
Jim Ramey, The Wilderness Society
Lindsay Bourgoine, Protect Our Winters
56 slides
The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor
The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor
KSU Proceedings on Cybersecurity Education, Research and Practice
In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne
KSU Proceedings on Cybersecurity Education, Research and Practice
This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …
Detangling The Interrelationships Between Self-Regulation And Ill-Structured Problem Solving In Problem-Based Learning, Xun Ge, Victor Law, Kun Huang
Detangling The Interrelationships Between Self-Regulation And Ill-Structured Problem Solving In Problem-Based Learning, Xun Ge, Victor Law, Kun Huang
Interdisciplinary Journal of Problem-Based Learning
One of the goals for problem-based learning (PBL) is to promote self-regulation. Although self-regulation has been studied extensively, its interrelationships with ill-structured problem solving have been unclear. In order to clarify the interrelationships, this article proposes a conceptual framework illustrating the iterative processes among problem-solving stages (i.e., problem representation and solution generation) and self-regulation phases (i.e., planning, execution, and reflection). The dynamics of the interrelationships are further illustrated with three ill-structured problem-solving examples in different domains (i.e., information problem solving, historical inquiry, and science inquiry). The proposed framework contributes to research and practice by providing a new lens to examine …
Working Waterfronts: On History, Conflicts, And Finding A Balance Case Studies Of The Lynnhaven River, The Ware River, And The Eastern Shore Of Virginia, Noah Trombly, Derek Van De Walle, Chelsea Wilkins
Working Waterfronts: On History, Conflicts, And Finding A Balance Case Studies Of The Lynnhaven River, The Ware River, And The Eastern Shore Of Virginia, Noah Trombly, Derek Van De Walle, Chelsea Wilkins
Virginia Coastal Policy Center
No abstract provided.
Getches-Wilkinson Center Newsletter, Fall 2016, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment
Getches-Wilkinson Center Newsletter, Fall 2016, University Of Colorado Boulder. Getches-Wilkinson Center For Natural Resources, Energy, And The Environment
Getches-Wilkinson Center for Natural Resources, Energy, and the Environment Newsletter (2013-)
No abstract provided.
Santa Clara Magazine, Volume 57 Number 4, Fall 2016, Santa Clara University
Santa Clara Magazine, Volume 57 Number 4, Fall 2016, Santa Clara University
Santa Clara Magazine
3 - MISSION MATTERS
4 - THE BEST RUGBY TEAM EVER. By Sam Scott '96.
6 - QUESTIONS
Hampton Roads Sanitation District’S Sustainable Water Initiative For Tomorrow Proposal, Patrick Harner, Alexa Pecht, Emily Tucker
Hampton Roads Sanitation District’S Sustainable Water Initiative For Tomorrow Proposal, Patrick Harner, Alexa Pecht, Emily Tucker
Virginia Coastal Policy Center
No abstract provided.
Enhancing Public Engagement On Offshore Wind Energy Using Genius Loci: A Case Study From A Lake Michigan Coastal Community, Erik Edward Nordman, Daniel O'Keefe, Erika Arndt
Enhancing Public Engagement On Offshore Wind Energy Using Genius Loci: A Case Study From A Lake Michigan Coastal Community, Erik Edward Nordman, Daniel O'Keefe, Erika Arndt
Erik Edward Nordman
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
A Legal Examination Of Revenge Pornography And Cyber-Harassment, Thomas Lonardo, Tricia Martland, Doug White
Journal of Digital Forensics, Security and Law
This paper examines the current state of the statutes in the United States as they relate to cyber-harassment in the context of "revenge porn". Revenge porn refers to websites which cater to those wishing to exploit, harass, or otherwise antagonize their ex partners using pornographic images and videos which were obtained during their relationships. The paper provide examples and illustrations as well as a summary of current statute in the United States. The paper additionally explores some of the various legal remedies available to victims of revenge pornography.
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Special Issue On Cyberharassment Investigation: Advances And Trends, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington
Journal of Digital Forensics, Security and Law
Empirical and anecdotal evidence indicates that cyberharassment is more prevalent as the use of social media becomes increasingly widespread, making geography and physical proximity irrelevant. Cyberharassment can take different forms (e.g., cyberbullying, cyberstalking, cybertrolling), and be motivated by the objectives of inflicting distress, exercising control, impersonation, and defamation. Little is currently known about the modus operandi of offenders and their psychological characteristics. Investigation of these behaviours is particularly challenging because it involves digital evidence distributed across the devices of both alleged offenders and victims, as well as online service providers, sometimes over an extended period of time. This special issue …
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Differentiating Cyberbullies And Internet Trolls By Personality Characteristics And Self-Esteem, Lauren A. Zezulka, Kathryn C. Seigfried-Spellar
Journal of Digital Forensics, Security and Law
Cyberbullying and internet trolling are both forms of online aggression or cyberharassment; however, research has yet to assess the prevalence of these behaviors in relationship to one another. In addition, the current study was the first to investigate whether individual differences and self-esteem discerned between self-reported cyberbullies and/or internet trolls (i.e., Never engaged in either, Cyberbully-only, Troll-only, Both Cyberbully and Troll). Of 308 respondents solicited from Mechanical Turk, 70 engaged in cyberbullying behaviors, 20 engaged in only trolling behaviors, 129 self-reported both behaviors, and 89 self-reported neither behavior. Results yielded low self-esteem, low conscientiousness, and low internal moral values for …
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
The Impact Of Low Self-Control On Online Harassment: Interaction With Opportunity., Hyunin Baek, Michael M. Losavio, George E. Higgins
Journal of Digital Forensics, Security and Law
Developing Internet technology has increased the rates of youth online harassment. This study examines online harassment from adolescents with low self-control and the moderating effect of opportunity. The data used in this study were collected by the Korea Institute of Criminology in 2009. The total sample size was 1,091. The results indicated that low self-control, opportunity, and gender have a significant influence on online harassment. However, these results differed according to gender; for males, low self-control significantly impacted online harassment; for females, however, only low self-control significantly impacted online harassment. Furthermore, the interaction between low self-control and opportunity did not …
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Toward Online Linguistic Surveillance Of Threatening Messages, Brian H. Spitzberg, Jean Mark Gawron
Journal of Digital Forensics, Security and Law
Threats are communicative acts, but it is not always obvious what they communicate or when they communicate imminent credible and serious risk. This paper proposes a research- and theory-based set of over 20 potential linguistic risk indicators that may discriminate credible from non-credible threats within online threat message corpora. Two prongs are proposed: (1) Using expert and layperson ratings to validate subjective scales in relation to annotated known risk messages, and (2) Using the resulting annotated corpora for automated machine learning with computational linguistic analyses to classify non-threats, false threats, and credible threats. Rating scales are proposed, existing threat corpora …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.
The Reduced Form Of Litigation Models And The Plaintiff's Win Rate, Jonah B. Gelbach
The Reduced Form Of Litigation Models And The Plaintiff's Win Rate, Jonah B. Gelbach
All Faculty Scholarship
In this paper I introduce what I call the reduced form approach to studying the plaintiff's win rate in litigation selection models. A reduced form comprises a joint distribution of plaintiff's and defendant's beliefs concerning the probability that the plaintiff would win in the event a dispute were litigated; a conditional win rate function that tells us the actual probability of a plaintiff win in the event of litigation, given the parties' subjective beliefs; and a litigation rule that provides the probability that a case will be litigated given the two parties' beliefs. I show how models with very different-looking …
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
On Abstraction And Equivalence In Software Patent Doctrine: A Response To Bessen, Meurer And Klemens, Andrew Chin
Journal of Intellectual Property Law
No abstract provided.
1956 Salinas River Basin Investigation, Bulletin No. 19
1956 Salinas River Basin Investigation, Bulletin No. 19
State and Federal Documents Relating to Monterey and San Luis Obispo Counties
The February 1956 Salinas River Basin Investigation (State Water Resources Board Bulletin No. 19) contains an inventory of underground and surface water resources of the Salinas River Basin, estimates of present and probably ultimate water utilization, estimates of present and probably ultimate supplemental water requirements, and preliminary plans and cost estimates for local water development works and for works for possible importation of water from sources outside of the basin.
1904, Water Resources In Salinas, United States Department Of Interior, Homer Hamlin
1904, Water Resources In Salinas, United States Department Of Interior, Homer Hamlin
State and Federal Documents Relating to Monterey and San Luis Obispo Counties
The 1904 report pertains largely to that portion of the Salinas Valley lying within the boundaries of Monterey County. It describes the geography, topography, geology, climate factors and hydrology of the region discussing the methods of irrigation and irrigation systems, the extent of underground waters, and the possibility of extending irrigation by utilization of surface streams and impounding of flood waters.
1946 Salinas Basin Investigation Summary Report, Bulletin No. 52-B
1946 Salinas Basin Investigation Summary Report, Bulletin No. 52-B
State and Federal Documents Relating to Monterey and San Luis Obispo Counties
This joint 1946 18-month investigation of the Salinas Basin by the State Department of Water Resources and the County of Monterey deals with conditions in the lower Salinas River Basin near Monterey Bay due to saline water intrusion into the groundwater supply that was utilized for irrigation, domestic and industrial purposes. The report discusses the history of the basin, a description of the Salinas Valley, sub-basins, inflow and outflow, crops, wells, percolation, underground hydrology, quality of water, evaluation of water problem, methods of conservation, proposed solution and legal considerations.