Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel Dec 2015

Gandhi’S Prophecy: Corporate Violence And A Mindful Law For Bhopal, Nehal A. Patel

Nehal A. Patel

AbstractOver thirty years have passed since the Bhopal chemical disaster began,and in that time scholars of corporate social responsibility (CSR) havediscussed and debated several frameworks for improving corporate responseto social and environmental problems. However, CSR discourse rarelydelves into the fundamental architecture of legal thought that oftenbuttresses corporate dominance in the global economy. Moreover, CSRdiscourse does little to challenge the ontological and epistemologicalassumptions that form the foundation for modern economics and the role ofcorporations in the world.I explore methods of transforming CSR by employing the thought ofMohandas Gandhi. I pay particular attention to Gandhi’s critique ofindustrialization and principle of swadeshi (self-sufficiency) …


Democracy And Torture, Patrick A. Maurer Oct 2015

Democracy And Torture, Patrick A. Maurer

Patrick A Maurer

September 11th spawned an era of political changes to fundamental rights. The focus of this discussion is to highlight Guantanamo Bay torture incidents. This analysis will explore the usages of torture from a legal standpoint in the United States.


Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman Sep 2015

Congressional Cybersecurity Oversight: Who’S Who And How It Works, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cybersecurity remains perhaps the greatest challenge to the economic and physical well being of governments, individuals, and business worldwide. During recent months the United States has witnessed many disruptive and expensive cyber breaches. No single U.S. governmental agency or congressional committee maintains primary responsibility for the numerous issues related to cybersecurity. Good oversight stands at the core of good government. Oversight is Congress’s way of making sure that the administration is carrying out federal law in the way Congress intended. So many aspects of cybersecurity have the potential for use by: terrorists; by foreign entities as a tool to conduct …


Ip Piracy & Developing Nations: A Recipe For Terrorism Funding, Brandy G. Robinson Feb 2015

Ip Piracy & Developing Nations: A Recipe For Terrorism Funding, Brandy G. Robinson

Brandy G Robinson

When events such as 9/11 hit the U.S., no one thought that terrorists funded these activities through intellectual property piracy. On the surface, intellectual property (IP) piracy and terrorism are two distant topics. However, these topics are not distant but closely connected, as terrorist groups thrive on IP piracy, especially in developing nations, which has led to successful terrorist funding opportunities. Because IP piracy evades normal detection and developing nations do not thoroughly understand it, terrorist groups gravitate towards IP piracy for funding, which presents a distinct global dilemma.

Intellectual property rights and laws, namely criminal enforcement mechanisms, are essential …


Redefining Terrorism: The Danger Of Misunderstanding The Modern World's Gravest Threat, Jennifer Breedon Jan 2015

Redefining Terrorism: The Danger Of Misunderstanding The Modern World's Gravest Threat, Jennifer Breedon

Jennifer Breedon

No abstract provided.