Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences

2011

Institution
Keyword
Publication
Publication Type
File Type

Articles 391 - 420 of 1176

Full-Text Articles in Law

Data Note: Job Seekers With Disabilities At One-Stop Career Centers: An Examination Of Registration For Wagner-Peyser Funded Employment Services, 2002 To 2009, David Hoff, Frank A. Smith Jun 2011

Data Note: Job Seekers With Disabilities At One-Stop Career Centers: An Examination Of Registration For Wagner-Peyser Funded Employment Services, 2002 To 2009, David Hoff, Frank A. Smith

Data Note Series, Institute for Community Inclusion

The Wagner-Peyser Act of 1933 established a nationwide system of public employment services, known as the Employment Service. Via the Workforce Investment Act of 1998, the Employment Service was made part of the One-Stop Career Center service-delivery system. Wagner-Peyser is a primary source of funding for these centers, which make employment services available to all people, including those with disabilities. There are currently 1,800+ comprehensive One-Stop Career Centers throughout the United States, as well as satellite and affiliate centers.


Global Sex Trade And Women Trafficking In Nigeria, Rasheed O. Olaniyi Jun 2011

Global Sex Trade And Women Trafficking In Nigeria, Rasheed O. Olaniyi

Journal of Global Initiatives: Policy, Pedagogy, Perspective

Academic discourses and policy debates on the phenomenon of women trafficking have focused on the threat of illegal migration, migration management, and the stereotypical linkages between criminality and migration. Such themes neglected the perspectives of trafficking victims and the social context, most especially closed borders and poverty. Obviously, women trafficking constitute one of the anxieties and disruptive effects of globalization. For many women, migration across the polarized economy under the regime of globalization is associated with exploitation, criminalization, and insecurity. This paper argues that trafficking in women reflects inequality on a global scale: transfer of resources from depressed economy to …


Go Farm, Goleta: Urban Agriculture Protection For Eastern Goleta Valley, Eli M. Krispi Jun 2011

Go Farm, Goleta: Urban Agriculture Protection For Eastern Goleta Valley, Eli M. Krispi

Master's Theses

This paper explores two potential land use planning strategies that can be used to preserve and enhance the economic viability of agricultural operations surrounded by suburban development in Santa Barbara County’s Eastern Goleta Valley: buffers between agriculture and other land uses, and agritourism. In the case of buffers, academic literature is examined to determine how effective buffers are at various tasks (filtering runoff, mitigating dust and wind, providing habitat, etc.) and how to construct buffers to maximize their effectiveness. Land use plans and codes from several California jurisdictions are studied to see how buffers are put to use. Academic literature …


Change: An Analysis Of Vote Choice In The 2008 Presidential Election, Maryssa A. Mataras Jun 2011

Change: An Analysis Of Vote Choice In The 2008 Presidential Election, Maryssa A. Mataras

Honors Theses

This thesis investigates the factors that helped Americans come to a vote choice in the 2008 presidential election. After an in-depth analysis and presentation on the existing literature, I then present key moments in both McCain and Obama’s campaigns looking at the context, campaigns, and candidates. I then break down the turnout and vote choice of each major social group and demographic in the United States, juxtaposing it with the group’s historical voting trends and turnout. In 2008 there was a large nationwide Democratic shift. Chapter four seeks to defend whether it was the context of the election or the …


Legal Experiences Of Women Survivors Of Domestic Violence: A Need For Policies That Address The Justice Gap, Kimberly Ann Puhala Jun 2011

Legal Experiences Of Women Survivors Of Domestic Violence: A Need For Policies That Address The Justice Gap, Kimberly Ann Puhala

Graduate Doctoral Dissertations

The problems associated with the civil legal system for women who have experienced domestic violence have been persistent over time and still exist today. The current sociopolitical context in this state frames access to civil legal services either through a means-tested (and underfunded) program (Civil Legal Assistance) or as a privately purchased market service. This leaves a limited amount of low- or no-cost alternatives, which creates a gap in services for those women whose income is too high to qualify for Civil Legal Assistance programs, yet too low to afford to hire a private attorney. This study examines this two-tiered …


Recent Developments In European Bank Competition, Juliana Yu Sun Jun 2011

Recent Developments In European Bank Competition, Juliana Yu Sun

Research Collection School Of Economics

This paper investigates the degree of bank competition in the euro area, the U.S. and U.K. before and after the recent financial crisis, and revisits the issue whether the introduction of EMU and the euro have had any impact on bank competition. The results suggest that the level of bank competition converged across euro area countries in the wake of the EMU. The recent global financial crisis led to a fall in competition in several countries and especially where large credit and housing booms had preceded the crisis...


The Federal Protective Power And Targeted Killing Of U.S. Citizens, Greg Mcneal May 2011

The Federal Protective Power And Targeted Killing Of U.S. Citizens, Greg Mcneal

Greg McNeal

In this responsive essay I argue that the Constitution envisions circumstances when the president may order U.S. citizens to be killed. It may be akin to the facts in al-Awlaki, where one is actively making war against the United States, or it may be in lesser circumstances that threaten the instruments of federal power. A settled example where a killing was authorized to protect the federal government was in Cunningham v. Neagle, 135 U.S. 1 (1890), there the Court addressed the killing of a U.S. citizen by Neagle, a federal marshal who was dispatched to protect Justice Field from an …


बाधकृत मैदानी आद्र क्षेत्रो में मातस्यकी प्रबंधन (Fisheries Management In Floodplain Wetlands), Ganesh Chandra May 2011

बाधकृत मैदानी आद्र क्षेत्रो में मातस्यकी प्रबंधन (Fisheries Management In Floodplain Wetlands), Ganesh Chandra

Ganesh Chandra

No abstract provided.


Legal Services Needed; Lawyers Need Not Apply, Gillian K. Hadfield May 2011

Legal Services Needed; Lawyers Need Not Apply, Gillian K. Hadfield

Gillian K Hadfield

No abstract provided.


Emerging Problems In Knowledge Sharing And The Three New Ethics Of Knowledge Transfer, Mikhail Koulikov May 2011

Emerging Problems In Knowledge Sharing And The Three New Ethics Of Knowledge Transfer, Mikhail Koulikov

Mikhail Koulikov

Topics related to knowledge management and knowledge sharing have received extensive attention in the recent literature of management and information science. Much of the discussion has focused on how these processes take place - and frequently fail to take place - in formal business, corporate and organizational settings. Knowledge sharing, however, occurs along the entire spectrum of human activity. Often, information and knowledge are shared in ways that appear unregulated and even outright subversive. This paper surveys many of the recent critiques of formal mechanisms of knowledge sharing. It identifies a set of methods, structures and ethics of "informal" and …


Diasporic Designs Of House, Home, And Haven In Toni Morrison's Paradise, Cynthia Dobbs May 2011

Diasporic Designs Of House, Home, And Haven In Toni Morrison's Paradise, Cynthia Dobbs

Cynthia Dobbs

No abstract provided.


Warren Limmer, The Black Knight Of Minnesota's Marriage Equality Debate, Aaron J. Shuler May 2011

Warren Limmer, The Black Knight Of Minnesota's Marriage Equality Debate, Aaron J. Shuler

Aaron J Shuler

No abstract provided.


Actualidad De La Expropiación Regulatoria, Jose Luis Sardon May 2011

Actualidad De La Expropiación Regulatoria, Jose Luis Sardon

Jose Luis Sardon

No abstract provided.


Traps And Pitfalls In Comparatively Analysing Reconciliation – A Critical Epistemological Contribution And A Research Agenda, Nicos Trimikliniotis, Wiebke Kiem May 2011

Traps And Pitfalls In Comparatively Analysing Reconciliation – A Critical Epistemological Contribution And A Research Agenda, Nicos Trimikliniotis, Wiebke Kiem

Nicos Trimikliniotis

This paper is a contribution to ongoing debate around comparative perspectives on reconciliation processes. For social researchers and activists alike, possibilities to draw parallels and make comparisons between conflicts and reconciliation processes in different historical, cultural and socio-economic settings are crucial – for adequate social scientific analysis as well as for appropriate political agency. While we find a huge body of literature around philosophical and methodological issues in international comparative endeavours, in recent times little has been said on the broader epistemological underpinnings of the debate. In how far are concrete social experiences and social knowledge derived thereof at all …


Annual Review Of Social Partnerships Issue 6, Maria May Seitanidi May 2011

Annual Review Of Social Partnerships Issue 6, Maria May Seitanidi

Maria May Seitanidi

This is the 6th Issue of the Annual Review of Social Partnerships previously known as the NPO-BUS Partnerships Bulletin.


Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld May 2011

Ios Mobile Device Forensics: Initial Analysis, Rita M. Barrios, Michael R. Lehrfeld

Annual ADFSL Conference on Digital Forensics, Security and Law

The ability to recover forensic artifacts from mobile devices is proving to be an ever-increasing challenge for investigators. Coupling this with the ubiquity of mobile devices and the increasing complexity and processing power they contain results in a reliance on them by suspects. In investigating Apple’s iOS devices -- namely the iPhone and iPad -- an investigator’s challenges are increased due to the closed nature of the platforms. What is left is an extremely powerful and complex mobile tool that is inexpensive, small, and can be used in suspect activities. Little is known about the internal data structures of the …


Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt May 2011

Forensic Analysis Of Smartphones: The Android Data Extractor Lite (Adel), Felix Freiling, Michael Spreitzenbarth, Sven Schmitt

Annual ADFSL Conference on Digital Forensics, Security and Law

Due to the ubiquitous use of smartphones, these devices become an increasingly important source of digital evidence in forensic investigations. Thus, the recovery of digital traces from smartphones often plays an essential role for the examination and clarification of the facts in a case. Although some tools already exist regarding the examination of smartphone data, there is still a strong demand to develop further methods and tools for forensic extraction and analysis of data that is stored on smartphones. In this paper we describe specifications of smartphones running Android. We further introduce a newly developed tool – called ADEL – …


Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi May 2011

Survey On Cloud Forensics And Critical Criteria For Cloud Forensic Capability: A Preliminary Analysis, Keyun Ruan, Ibrahim Baggili, Joe Carthy, Tahar Kechadi

Annual ADFSL Conference on Digital Forensics, Security and Law

In this paper we present the current results and analysis of the survey “Cloud forensics and critical criteria for cloud forensic capability” carried out towards digital forensic experts and practitioners. This survey was created in order to gain a better understanding on some of the key questions of the new field - cloud forensics - before further research and development. We aim to understand concepts such as its definition, the most challenging issues, most valuable research directions, and the critical criteria for cloud forensic capability.

Keywords: Cloud Forensics, Cloud Computing, Digital Forensics, Survey, Cloud Forensic Capability


Kindle Forensics: Acquisition & Analysis, Peter Hannay May 2011

Kindle Forensics: Acquisition & Analysis, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The Amazon Kindle eBook reader supports a wide range of capabilities beyond reading books. This functionality includes an inbuilt cellular data connection known as Whispernet. The Kindle provides web browsing, an application framework, eBook delivery and other services over this connection. The historic data left by user interaction with this device may be of forensic interest. Analysis of the Amazon Kindle device has resulted in a method to reliably extract and interpret data from these devices in a forensically complete manner.

Keywords: forensics, digital forensics, kindle, mobile, embedded, ebook, ereader


Sprawl In Canada And The United States (Powerpoint), Michael E. Lewyn May 2011

Sprawl In Canada And The United States (Powerpoint), Michael E. Lewyn

Michael E Lewyn

PowerPoints for a speech explaining that sprawl in Canada is (1) less extensive than in the USA and (2) caused partially by government regulation.


Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis May 2011

Aacsb‐Accredited Schools’ Adoption Of Information Security Curriculum, Linda Lau, Cheryl Davis

Annual ADFSL Conference on Digital Forensics, Security and Law

The need to professionally and successfully conduct computer forensic investigations of incidents has never been greater. This has launched an increasing demand for a skilled computer security workforce (Locasto, et al., 2011). This paper examines the extent to which AACSB-accredited universities located in Virginia, Maryland and Washington, D.C. are working towards providing courses that will meet this demand. The authors conduct an online research of the information security courses and programs offered by the 27 AACSB-accredited business schools in the selected area.

The preliminary investigation revealed that eight of the 27 participating universities did not offer any courses in cybersecurity, …


Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston May 2011

Digital Forensics Investigation In A Collegiate Environment, Robert E. Johnston

Annual ADFSL Conference on Digital Forensics, Security and Law

Creating, building, managing a cost effective digital forensics lab including a team of qualified examiners can be a challenge for colleges [1] with multiple campuses in multiple towns, counties and states. Leaving such examination responsibilities to each of the campuses results in not only disparity in the results but more than likely excessive duplication of efforts as well as the potential for compromise of evidence. Centralizing the forensic efforts results in a team that is not subject to the political pressures of a campus and virtually eliminates the possibility of examiner favoritism. Learn what it takes to create a cost …


Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay May 2011

Backtrack In The Outback - A Preliminary Report On Cyber Security Evaluation Of Organisations In Western Australia, Craig Valli, Andrew Woodward, Peter Hannay

Annual ADFSL Conference on Digital Forensics, Security and Law

The authors were involved in extensive vulnerability assessment and penetration testing of over 15 large organisations across various industry sectors in the Perth CBD. The actual live testing involved a team of five people for approximately a four week period, and was black box testing. The scanning consisted of running network and web vulnerability tools, and in a few cases, exploiting vulnerability to establish validity of the tools. The tools were run in aggressive mode with no attempt made to deceive or avoid detection by IDS/IPS or firewalls. The aim of the testing was to determine firstly whether these organisations …


Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton May 2011

Creating Realistic Corpora For Security And Forensic Education, Kam Woods, Christopher A. Lee, Simson Garfinkel, David Dittrich, Adam Russell, Kris Kearton

Annual ADFSL Conference on Digital Forensics, Security and Law

We present work on the design, implementation, distribution, and use of realistic forensic datasets to support digital forensics and security education. We describe in particular the “M57-Patents” scenario, a multi-modal corpus consisting of hard drive images, RAM images, network captures, and images from other devices typically found in forensics investigations such as USB drives and cellphones. Corpus creation has been performed as part of a scripted scenario; subsequently it is less “noisy” than real-world data but retains the complexity necessary to support a wide variety of forensic education activities. Realistic forensic corpora allow direct comparison of approaches and tools across …


A Palin Entry Could Upend Bachmann And Benefit Pawlenty In Iowa, Aaron J. Shuler May 2011

A Palin Entry Could Upend Bachmann And Benefit Pawlenty In Iowa, Aaron J. Shuler

Aaron J Shuler

No abstract provided.


Slides: Planning Tools: Wildlife Mitigation Plan (Wmp), Comprehensive Drilling Plan (Cdp), Geographic Area Plan (Gap), Ginny Brannon May 2011

Slides: Planning Tools: Wildlife Mitigation Plan (Wmp), Comprehensive Drilling Plan (Cdp), Geographic Area Plan (Gap), Ginny Brannon

Best Management Practices (BMPs): What? How? And Why? (May 26)

Presenter: Ginny Brannon, Colorado Department of Natural Resources

7 slides


Slides: Arctic Ecosystem Services Measurement And Modeling Project, Eric Biltonen May 2011

Slides: Arctic Ecosystem Services Measurement And Modeling Project, Eric Biltonen

Best Management Practices (BMPs): What? How? And Why? (May 26)

Presenter: Eric Biltonen, PhD, Environment Economist, Houston Advanced Research Center

8 slides


Slides: Master Development Plans (Mdps) / Geographic Area Plans (Gaps): Comprehensive Planning Tools For Oil And Gas Projects, Allen B. Crockett May 2011

Slides: Master Development Plans (Mdps) / Geographic Area Plans (Gaps): Comprehensive Planning Tools For Oil And Gas Projects, Allen B. Crockett

Best Management Practices (BMPs): What? How? And Why? (May 26)

Presenter: Mary Bloomstran, Edge Environmental

20 slides


Agenda: Best Management Practices (Bmps): What? How? And Why?, Houston Advanced Research Center. Environmentally Friendly Drilling Systems Program, Research Partnership To Secure Energy For America, University Of Colorado Boulder. Natural Resources Law Center. Intermountain Oil And Gas Bmp Project May 2011

Agenda: Best Management Practices (Bmps): What? How? And Why?, Houston Advanced Research Center. Environmentally Friendly Drilling Systems Program, Research Partnership To Secure Energy For America, University Of Colorado Boulder. Natural Resources Law Center. Intermountain Oil And Gas Bmp Project

Best Management Practices (BMPs): What? How? And Why? (May 26)

The Environmentally Friendly Drilling Systems (EFD) Program, managed by the Houston Advanced Research Center, works to identify, develop and transfer critical, cost effective, new technologies that can provide policy makers and industry with the ability to develop natural gas reserves in a safe and environmentally friendly manner. Funding for the EFD Program is through a grant from the Research Partnership to Secure Energy for America, established under the 2005 Energy Act. Within the EFD Program, some projects focus on technologies for developing energy sources in environmentally sensitive areas; others (like the NRLC’s BMP Project) seek ways to reduce the environmental …


Slides: Introduction To Large-Scale Planning And The Intermountain Bmp Project, Kathryn Mutz May 2011

Slides: Introduction To Large-Scale Planning And The Intermountain Bmp Project, Kathryn Mutz

Best Management Practices (BMPs): What? How? And Why? (May 26)

Presenter: Kathryn Mutz, Natural Resources Law Center, University of Colorado School of Law

18 slides