Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

2018

Institution
Keyword
Publication
Publication Type
File Type

Articles 91 - 120 of 292

Full-Text Articles in Law

Comparative Strategy In Professional Military Education, Jean-Loup Samaan Jun 2018

Comparative Strategy In Professional Military Education, Jean-Loup Samaan

The US Army War College Quarterly: Parameters

No abstract provided.


The Conventionality Of Russia's Unconventional Warfare, Patrick J. Savage Jun 2018

The Conventionality Of Russia's Unconventional Warfare, Patrick J. Savage

The US Army War College Quarterly: Parameters

No abstract provided.


Russia's Military And Security Privatization, Christopher R. Spearin Jun 2018

Russia's Military And Security Privatization, Christopher R. Spearin

The US Army War College Quarterly: Parameters

No abstract provided.


1911 Triangle Factory Fire — Building Safety Codes, Paul H. Robinson, Sarah M. Robinson Jun 2018

1911 Triangle Factory Fire — Building Safety Codes, Paul H. Robinson, Sarah M. Robinson

All Faculty Scholarship

Can a crime make our world better? Crimes are the worst of humanity’s wrongs but, oddly, they sometimes do more than anything else to improve our lives. As it turns out, it is often the outrageousness itself that does the work. Ordinary crimes are accepted as the background noise of our everyday existence but some crimes make people stop and take notice – because they are so outrageous, or so curious, or so heart-wrenching. These “trigger crimes” are the cases that this book is about.

They offer some incredible stories about how people, good and bad, change the world around …


Stuff Happens: Understanding Causation In Policy And Strategy, Andrew A. Hill, Stephen J. Gerras Jun 2018

Stuff Happens: Understanding Causation In Policy And Strategy, Andrew A. Hill, Stephen J. Gerras

The US Army War College Quarterly: Parameters

No abstract provided.


From The Editor, Antulio J. Echevarria Ii Jun 2018

From The Editor, Antulio J. Echevarria Ii

The US Army War College Quarterly: Parameters

No abstract provided.


The Military As A Social Experiment: Challenging A Trope, Jacqueline E. Whitt, Elizabeth A. Perazzo Jun 2018

The Military As A Social Experiment: Challenging A Trope, Jacqueline E. Whitt, Elizabeth A. Perazzo

The US Army War College Quarterly: Parameters

No abstract provided.


Russia's Frozen Conflicts And The Donbas, Erik J. Grossman Jun 2018

Russia's Frozen Conflicts And The Donbas, Erik J. Grossman

The US Army War College Quarterly: Parameters

No abstract provided.


Fighting Russia? Modeling The Baltic Scenarios, Ben S. Wermeling Jun 2018

Fighting Russia? Modeling The Baltic Scenarios, Ben S. Wermeling

The US Army War College Quarterly: Parameters

No abstract provided.


Book Reviews, Usawc Press Jun 2018

Book Reviews, Usawc Press

The US Army War College Quarterly: Parameters

No abstract provided.


Contents, Adfsl May 2018

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, Adfsl May 2018

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Election Administration Within The Sphere Of Politics: How Bureaucracy Can Facilitate Democracy With Policy Decisions, Nicholas S. Martinez May 2018

Election Administration Within The Sphere Of Politics: How Bureaucracy Can Facilitate Democracy With Policy Decisions, Nicholas S. Martinez

FIU Electronic Theses and Dissertations

Public bureaucracy finds itself in a strange place at the intersection of political science and public administration. Political science finds that, within representative democracy, discretion granted to bureaucrats threatens the nature of democracy by subverting politicians who represent the will of the people – bureaucracy vs democracy. At the same time, public administration holds that, in the interest of promoting democracy, bureaucracy should be objective in its implementation of policy in a way that eliminates the influence of politics from decision-making – politics vs bureaucracy. Those positions are seemingly contradictory in nature. From one perspective, bureaucracy is undemocratic because it …


Legislation Meets Tradition: Interpretations And Implications Of The Volunteer Protection Act For Nonprofit Organizations As Viewed Through The Lens Of Hermeneutics, Patricia Groble, Nicholas C. Zingale, Joseph Mead May 2018

Legislation Meets Tradition: Interpretations And Implications Of The Volunteer Protection Act For Nonprofit Organizations As Viewed Through The Lens Of Hermeneutics, Patricia Groble, Nicholas C. Zingale, Joseph Mead

Journal of Public Management & Social Policy

Volunteers enable nonprofit organizations to reach more clients and more effectively fulfill their missions. However, the good done by these volunteers may be offset by their careless behavior. Rising fears that resulting lawsuits and monetary damages would deter potential volunteers from volunteering caused Congress to enact the Volunteer Protection Act. This research studies court decisions to ascertain whether the law fulfills its purpose and considers the implications of these interpretations for nonprofit managers. It also tests the usefulness of the hermeneutical approach to legal interpretation and to determine how the Act has changed as a result of these court decisions …


Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth May 2018

Analysis Of Data Erasure Capability On Sshd Drives For Data Recovery, Andrew Blyth

Annual ADFSL Conference on Digital Forensics, Security and Law

Data Protection and Computer Forensics/Anti-Forensics has now become a critical area of concern for organizations. A key element to this is how data is sanitized at end of life. In this paper we explore Hybrid Solid State Hybrid Drives (SSHD) and the impact that various Computer Forensics and Data Recovery techniques have when performing data erasure upon a SSHD.


Knowledge Expiration In Security Awareness Training, Tianjian Zhang May 2018

Knowledge Expiration In Security Awareness Training, Tianjian Zhang

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle May 2018

Positive Identification Of Lsb Image Steganography Using Cover Image Comparisons, Michael Pelosi, Nimesh Poudel, Pratap Lamichhane, Devon Lam, Gary Kessler, Joshua Macmonagle

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we introduce a new software concept specifically designed to allow the digital forensics professional to clearly identify and attribute instances of LSB image steganography by using the original cover image in side-by-side comparison with a suspected steganographic payload image. The “CounterSteg” software allows detailed analysis and comparison of both the original cover image and any modified image, using sophisticated bit- and color-channel visual depiction graphics. In certain cases, the steganographic software used for message transmission can be identified by the forensic analysis of LSB and other changes in the payload image. The paper demonstrates usage and typical …


Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba May 2018

Exploring The Use Of Graph Databases To Catalog Artifacts For Client Forensics, Rose Shumba

Annual ADFSL Conference on Digital Forensics, Security and Law

Cloud computing has revolutionized the methods by which digital data is stored, processed, and transmitted. It is providing users with data storage and processing services, enabling access to resources through multiple devices. Although organizations continue to embrace the advantages of flexibility and scalability offered by cloud computing, insider threats are becoming a serious concern as cited by security researchers. Insiders can use authorized access to steal sensitive information, calling for the need for an investigation. This concept paper describes research in progress towards developing a Neo4j graph database tool to enhance client forensics. The tool, with a Python interface, allows …


Protecting San Francisco Residents From The Wolves Of Wall Street: A Case Study, Jessica Lindquist May 2018

Protecting San Francisco Residents From The Wolves Of Wall Street: A Case Study, Jessica Lindquist

Master's Projects and Capstones

This research conducts the first deep data analysis of the public complaints filed to the Consumer Financial Protection Bureau's Consumer Complaint database by San Francisco residents. The case study highlights how consumer financial harms are a citywide problem: San Franciscans living at every income level and in every part of the city are struggling to resolve their financial issues with the wolves of Wall Street, the financial services industry. The recommendations center on what the city, particularly the San Francisco Office of Financial Empowerment, can do at a local level now that the Trump administration is focused on deregulating the …


Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D May 2018

Non-Use Of A Mobile Phone During Conducting Crime Can Also Be Evidential, Vinod Polpaya Bhattathiripad Ph D

Annual ADFSL Conference on Digital Forensics, Security and Law

Cyber-clever criminals who are aware of the consequence of using mobile phones during conducting crimes often stay away from their phones while involved in crimes. Some of them even change their handset and SIM card, subsequently. This article looks into how, intentional disassociation (and even unintentional non-use) of mobile phone in (non-cyber) crimes, can become evidential clues of the perpetrators’ involvement in criminal acts. With the help of a recent judicial episode, this article reveals how extremely careful and masterful handling of extensive and voluminous Call Details Records and tower dumps by a cyber-savvy investigating official can unearth evidential clues …


Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang May 2018

Live Gpu Forensics: The Process Of Recovering Video Frames From Nvidia Gpu, Yazeed M. Albabtain, Baijian Yang

Annual ADFSL Conference on Digital Forensics, Security and Law

The purpose of this research is to apply a graphics processing unit (GPU) forensics method to recover video artifacts from NVIDIA GPU. The tested video specs are 512 x 512 in resolution for video 1 and 800 x 600 in resolution for video 2. Both videos are mpeg4 video codec. A VLC player was used in the experiment. A special program has been developed using OpenCL to recover 1) patterns that are frames consist of pixel values and 2) dump data from the GPU global memory. The dump data that represent the video frame were located using simple steps. The …


Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac May 2018

Unmanned Aerial Vehicle Forensic Investigation Process: Dji Phantom 3 Drone As A Case Study, Alan Roder, Kim-Kwang Raymond Choo, Nhien-A Le-Khac

Annual ADFSL Conference on Digital Forensics, Security and Law

Drones (also known as Unmanned Aerial Vehicles – UAVs) are a potential source of evidence in a digital investigation, partly due to their increasing popularity in our society. However, existing UAV/drone forensics generally rely on conventional digital forensic investigation guidelines such as those of ACPO and NIST, which may not be entirely fit-for-purpose. In this paper, we identify the challenges associated with UAV/drone forensics. We then explore and evaluate existing forensic guidelines, in terms of their effectiveness for UAV/drone forensic investigations. Next, we present our set of guidelines for UAV/drone investigations. Finally, we demonstrate how the proposed guidelines can be …


Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik May 2018

Detection And Recovery Of Anti-Forensic (Vault) Applications On Android Devices, Michaila Duncan, Umit Karabiyik

Annual ADFSL Conference on Digital Forensics, Security and Law

Significant number of mobile device users currently employ anti-forensics applications, also known as vault or locker applications, on their mobile devices in order to hide files such as photos. Because of this, investigators are required to spend a large portion of their time manually looking at the applications installed on the device. Currently, there is no automated method of detecting these anti-forensics applications on an Android device. This work presents the creation and testing of a vault application detection system to be used on Android devices. The main goal of this work is twofold: (i) Detecting and reporting the presence …


Frictions In Transitional Justice Processes: Colombia's Victims Law, Integral Reparation And The Temporality Of Multiple Victimization In Displaced Women, Sophie Rähme May 2018

Frictions In Transitional Justice Processes: Colombia's Victims Law, Integral Reparation And The Temporality Of Multiple Victimization In Displaced Women, Sophie Rähme

Gobernar: The Journal of Latin American Public Policy and Governance

This article addresses the challenges that integral reparation programs meet when aiming to respond to multiple victimization experienced by displaced women. By adopting the ethnographic concept of “frictions” (Tsing, 2005), I analyze four dimensions of discursive frictions that occur surrounding reparative practice backed by the Law on Victims and Land Restitution and its multiple local encounters and dis-encounters when compensating multiple victimization in the post-conflict of Medellín. Like other studies have identified shortcomings of the idealistic and innovative Colombian reparation program, it becomes evident that the integral reparation efforts fall short in addressing the real complexity of interrelated and multiples …


Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt May 2018

Military Justice: A Very Short Introduction (Book Review), Mark Patrick Nevitt

All Faculty Scholarship

This short essay reviews Professor Eugene Fidell’s recently published book, “Military Justice A Very Short Introduction” (Oxford Press). This book is a welcome addition to military law and military justice literature more generally. Eugene Fidell, a professor at Yale Law School, brings a tremendous breadth of experience as both a scholar and military justice practitioner. He also possesses a keen observational and critical eye to the subject of military justice practiced here and abroad.

The book review first provides an overview of Professor Fidell’s book, its organizational set-up, and where it sits in the broader context of military justice literature. …


Research To Practice: Medicaid Involvement In Employment-Related Programs- Findings From The National Survey Of State Systems And Employment For People With Disabilities, Jennifer Sullivan Sulewski, Dana Scott Gilmore, Susan Foley May 2018

Research To Practice: Medicaid Involvement In Employment-Related Programs- Findings From The National Survey Of State Systems And Employment For People With Disabilities, Jennifer Sullivan Sulewski, Dana Scott Gilmore, Susan Foley

Jennifer Sulewski

This brief analyzes data from ICI's National Survey of State Systems and Employment for People with Disabilities regarding the priority Medicaid agencies place on employment and their involvement in recent policy initiatives.


Non-Traditional Transitional Justice Mechanisms And Perceptions And Symptoms Of Victimization Among Diasporic Individuals: Members Of The Coptic Christian Diaspora In The United States As A Case Study, Samy S. A. Gerges May 2018

Non-Traditional Transitional Justice Mechanisms And Perceptions And Symptoms Of Victimization Among Diasporic Individuals: Members Of The Coptic Christian Diaspora In The United States As A Case Study, Samy S. A. Gerges

Doctor of International Conflict Management Dissertations

Transitional justice measures are state-centered measures articulating atrocities committed by officials and occurring within the borders of a specific state. Questioning members of a Diaspora about the impact of transitional justice on their self-classification as victims and their experienced symptoms of victimization may therefore support attempts to expand the field of transitional justice. This study contributes to a body of work promoting understanding of the possibilities and constraints of transitional justice mechanisms, in the context of hate crime against Copts by Muslims in Egypt. To analyze the impact of restored relationships on self-classified victimhood and experienced symptoms of victimization, the …


Higher Education Savings And Planning: Tax And Nontax Considerations, F. Philip Manns Jr., Timothy M. Todd May 2018

Higher Education Savings And Planning: Tax And Nontax Considerations, F. Philip Manns Jr., Timothy M. Todd

Texas A&M Law Review

Funding higher education is among the critical financial decisions made by individuals and families. There are myriad options. Yet, the conventional wisdom—namely using Section 529 Plans—may not be the optimal vehicle to effectuate this goal. Therefore, this Article discusses various strategies to plan, save, and pay for higher education. It compares various savings methods including gifts, UTMA accounts, Section 529 Plans, trusts, and other vehicles. The analysis explores both tax and non-tax considerations, including the effect of different strategies on financial aid, transaction costs, investor control, income taxes, gift and estate taxes, flexibility, and creditor protection. This Article concludes that …


Exploring Creative Problem Solving In Public Policy, Jade A. Costello May 2018

Exploring Creative Problem Solving In Public Policy, Jade A. Costello

Creativity and Change Leadership Graduate Student Master's Projects

This project explores the connection between creativity and public policy-making through guided facilitation. In this exploration, there are several products that have been developed. The first is an index that provides definitions, charts, and process explanations for creativity, facilitation and public policy. The second is a completed facilitation plan that incorporates both the FourSight model for group facilitation (Miller, Vehar, Firestein, Thurber & Nielsen, 2011a) and Marvin Weisbord’s (1992) exploration of creative strategies for discovering common ground through policy conferences. The third product is an evaluation matrix, which would be used post-facilitation to understand the strengths and weaknesses from the …


Identifying The Newly Insurable Medicaid Coverage Gap Population Under The Affordable Care Act: Who They Are And Where They Live, Samuel L. Woodruff May 2018

Identifying The Newly Insurable Medicaid Coverage Gap Population Under The Affordable Care Act: Who They Are And Where They Live, Samuel L. Woodruff

Capstone Experience

The goal of this Capstone Project is to better define and geographically locate the potential distribution of individuals who fall within the current Medicaid Coverage Gap and those populations who would be eligible for Medicaid under the expansion of Medicaid within the state of Nebraska. Using data from multiple United States Census Bureau sources, along with available data from the Health Resources and Services Administration (HRSA), this project looks to also locate populations of these individuals that may live within established Medically Underserved Areas (MUA's) or Health Professional Shortage Areas (HPSA's) within the state. American Community Survey 5-year Public Use …