Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Conference

2016

Discipline
Institution
Keyword
Publication
File Type

Articles 1 - 30 of 97

Full-Text Articles in Law

Science & Policy Issues Surrounding The Project, Emily Tucker, Patrick Harner Dec 2016

Science & Policy Issues Surrounding The Project, Emily Tucker, Patrick Harner

Virginia Coastal Policy Center Annual Conference

No abstract provided.


Sustainable Water Initiative For Tomorrow (Swift) Wastewater Injection Project, Ted Henifin, Charles Bott Dec 2016

Sustainable Water Initiative For Tomorrow (Swift) Wastewater Injection Project, Ted Henifin, Charles Bott

Virginia Coastal Policy Center Annual Conference

No abstract provided.


The Future Of International Spaceport Regulations: Which Response To Expect From The International Community?, Valentin Degrange Nov 2016

The Future Of International Spaceport Regulations: Which Response To Expect From The International Community?, Valentin Degrange

Space Traffic Management Conference

As humanity is today well into the 21st century, we witness the appearance of new prospects for the utilization and exploitation of outer space, making outer space increasingly “contested, congested and competitive”1. Many aspects of our daily lives have already come to depend on our occupation of Low Earth Orbits (LEO) and Geostationary Earth Orbits (GEO). As the number of space-related activities increases exponentially though, most notably in its commercial facet, so does the need for new spaceports and adequate regulations for the increased space traffic that will follow. The “big sky” theory which protected airborne travelers …


Space Traffic Management Concepts Leveraging Existing Frameworks, Stephen K. Hunter Nov 2016

Space Traffic Management Concepts Leveraging Existing Frameworks, Stephen K. Hunter

Space Traffic Management Conference

Leveraging existing U.S. regulatory frameworks, as well as international organizations, will dramatically shorten the time needed to develop an effective Space Traffic Management concept. Both the Department of Defense and the Department of Transportation have been working with the U.S. Congress to define and develop a Space Traffic Management concept that will allow the Office of Commercial Space Launch to begin a new mission that will help to ensure the safety and resilience of the space domain. Outside observers can easily see forward progress toward this, still, undeveloped concept. This paper explores potential final U.S. Space Traffic Management concepts that …


The Reporting Requirements Of The U.S. Commercial Space Launch Competitiveness Act: Status, Analysis, And Legal Implications, Michael S. Dodge Nov 2016

The Reporting Requirements Of The U.S. Commercial Space Launch Competitiveness Act: Status, Analysis, And Legal Implications, Michael S. Dodge

Space Traffic Management Conference

In November of 2015, President Obama signed the U.S. Commercial Space Launch Competitiveness Act (CSLCA) into law. The CSLCA addresses many subjects orbiting the field of space activities, although much of the attention respecting the law has focused on the role of government astronauts, the processes associated with licensing private remote sensing systems, or the authorization of space resource extraction; yet, a curious theme has found itself woven throughout the fabric of the law—the requirement to report to Congress the results of studies and inter-agency discussions impacting on various components of current or proposed activities. The legal and regulatory implications …


Spaceways: Airspace In Outer Space, Scott Haeffelin Nov 2016

Spaceways: Airspace In Outer Space, Scott Haeffelin

Space Traffic Management Conference

Forecasted future demand in space travel is driving the need for the development of space traffic management. Currently, orbital space traffic is mostly unregulated with internationally agreed upon best practices and self-interest driving space operators to avoid collisions with other spacecraft. This paper explores the future of space travel by presenting a concept of creating “airspace in space” or spaceways to manage the ever growing volumes of space traffic. Spaceways are analogous to airspace for aircraft with the goal of increasing levels of safety and reducing probabilities of collision. These goals can be achieved by creating traffic rules, defining valuable …


A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger Nov 2016

A Novel Approach For Controlled Deorbiting And Reentry Of Small Spacecraft, Larry H. Fineberg, Justin Treptow, Timothy Bass, Scott Clark, Yusef Johnson, Bradley Poffenberger

Space Traffic Management Conference

No abstract provided.


Program Nov 2016

Program

Health Law & Policy Conferences

No abstract provided.


The Conflict In Syria: Should The United States Get More Involved?, Jacob Peoples Nov 2016

The Conflict In Syria: Should The United States Get More Involved?, Jacob Peoples

Posters-at-the-Capitol

The purpose of this research is to explore the relations between Syria, Russia, and the United States in the Syrian civil war. The relationship has been in turmoil because of the complexities of the situation. Syria has been a designated state sponsor of terrorism since December 29, 1979, five years before the next designated state of Iran. Syria is a very important and strategic country and now more than ever has a large risk of being completely overrun by the newest terrorist group ISIS. The turmoil is possibly stemming initially from the result of a failed 1957 Central Intelligence Agency …


United States Federal Courts And Inter-Branch War Powers, Erica Lindsey Fields Nov 2016

United States Federal Courts And Inter-Branch War Powers, Erica Lindsey Fields

Posters-at-the-Capitol

US Federal Courts and Inter-Branch War Powers

Author: Erica Fields, with Dr. Jasmine Farrier and Dr. Laura Moyer

Department of Political Science- University of Louisville

Introduction

When a separation of powers issue arises between the branches of the United States government, they can seek remedy in the federal courts. This has become especially relevant in the area of war powers. Over the past 40 years, members of Congress have challenged Presidential encroachment of war powers 10 times in the courts.

Purpose

To determine if the rulings in the 10 war powers cases could best be explained by the ideologies of …


Fourth Annual Veterans Conference: Reintegration And Homecoming: Welcoming Warriors And Saluting Service, Renato Izquieta, Michael Blecker Nov 2016

Fourth Annual Veterans Conference: Reintegration And Homecoming: Welcoming Warriors And Saluting Service, Renato Izquieta, Michael Blecker

Veterans Law Conference

No abstract provided.


National Security In The Information Age: Are We Heading Toward Big Brother?, William C. Banks, Jake Laperruque, Douglas Cox, Lt. Colonel Jeffrey Addicott, Paul Gill, Douglas A. Ramseur, Thomas J. Ridge Oct 2016

National Security In The Information Age: Are We Heading Toward Big Brother?, William C. Banks, Jake Laperruque, Douglas Cox, Lt. Colonel Jeffrey Addicott, Paul Gill, Douglas A. Ramseur, Thomas J. Ridge

University of Richmond Law Review Symposium

Symposium Welcome: Alexander McDaniel, Symposium Editor, University of Richmond Law Review, and Wendy C. Perdue, Dean of the University of Richmond School of Law. (9:00 a.m. - 9:15 a.m.)

“How Does the Government Collect Data Through Surveillance?” Panel Discussion: William C. Banks, Distinguished Professor of Law at Syracuse University College of Law and Founding Director of the Institute for National Security and Counterterrorism, and Jake Laperruque, Privacy Fellow with The Constitution Project. Professor Paul D. Crane, Associate Professor at the University of Richmond School of Law, served as moderator. (9:15 a.m. - 10:30 a.m.)

“How Does the Government Retain and …


Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge Oct 2016

Designing Laboratories For Small Scale Digital Device Forensics, Richard P. Mislan, Tim Wedge

Annual ADFSL Conference on Digital Forensics, Security and Law

The ubiquity of small scale digital devices (SSDD), the public’s ever increasing societal dependence on SSDD, and the continual presence of SSDD at all types of crime scenes, including non-technical and violent crimes, demand a formalized curriculum for the education and training of future cyber forensic examiners. This paper presents the various SSDD forensics labs currently in use and under development for future use at the Purdue University Cyber Forensics Laboratory. The primary objective of each module is to provide specific real-world cases for the learning, comprehension, and understanding of hands-on investigative techniques and methodologies. The purpose of this paper …


Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos Oct 2016

Network Forensic Investigation Of Internal Misuse/Crime In Saudi Arabia: A Hacking Case, Abdulrazaq Al-Murjan, Konstantinos Xynos

Annual ADFSL Conference on Digital Forensics, Security and Law

There are ad-hoc guidelines and a limited policy on computer incident response that does not include computer forensic preparation procedures (e.g. logging incidents). In addition, these guidelines do not consider the requirement of Islamic law for admissible evidence at an organisational level in Saudi Arabia. Network forensic investigation might breach the Saudi law if they follow ad-hoc or international digital forensic standards such as Association of Chief Police Officers (ACPO) guidelines. This might put the organisation in a costly situation when a malicious employee sues an Islamic court. This is because the law of Saudi Arabia is complying with Islamic …


Don’T Share This Item! Developing Digital Collections And Services In A Consumer‐Licensed World, William M. Cross, Darby Orcutt Oct 2016

Don’T Share This Item! Developing Digital Collections And Services In A Consumer‐Licensed World, William M. Cross, Darby Orcutt

Charleston Library Conference

Libraries have always faced unique challenges in providing non‐academic content for academic use, but the digital age has brought particular problems of “one size fits all” consumer purchase models and vexing methods of digital rights management (DRM), wrapped up with a large bow of legal uncertainty for many institutions. These proceedings describe some practices for sharing consumer‐licensed popular materials and confronting legal and technical barriers, as well as what some libraries are considering and encountering in applying the law, fair use, user expectations, and common sense in developing collections and services around digital content that is geared directly to end …


On The Premises And Beyond: Managing Copyright Policy Through Institutional And Technological Change, Brandy Karl Oct 2016

On The Premises And Beyond: Managing Copyright Policy Through Institutional And Technological Change, Brandy Karl

Charleston Library Conference

Copyright issues are important to every library, large and small. Libraries, librarians, and library staff are protected by a host of exceptions and copyright rules that are often not followed correctly or at all. This article discusses easy, simple compliance with the laws protecting libraries from infringements made on the traditional library premises.

Further, the library’s work is increasingly off‐site. From virtual consultations to delivering digitized materials off‐site, copyright law can affect the depth and breadth of online services that would otherwise be equivalent to in‐person patron services. The paper describes “virtual library premises” and discusses the legal ramifications of …


One Library’S Successful Venture In Providing Comprehensive Streaming Media Services, Allyson Mower, Mary Ann James, Catherine Soehner, Maria Hunt, Dave Heyborne, Joni Clayton Oct 2016

One Library’S Successful Venture In Providing Comprehensive Streaming Media Services, Allyson Mower, Mary Ann James, Catherine Soehner, Maria Hunt, Dave Heyborne, Joni Clayton

Charleston Library Conference

Thoroughly understanding what professors and instructors needed to accomplish their teaching goals with streaming video was the first step enabling one academic library to successfully manage a rapid increase in demand for streaming media. The second element was incorporating an expert understanding of copyright law and the nature of the video marketplace.

This paper will strive to educate librarians and other professional library staff on how they can best integrate media streaming into mainstream library services for their campus faculty, as well as how to provide a full range of streaming services. The paper also will address workflow, communication with …


Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota Oct 2016

Paper Session Ii: Computer Forensics Field Triage Process Model, Marcus K. Rogers, James Goldman, Rick Mislan, Timothy Wedge, Steve Debrota

Annual ADFSL Conference on Digital Forensics, Security and Law

With the proliferation of digital based evidence, the need for the timely identification, analysis and interpretation of digital evidence is becoming more crucial. In many investigations critical information is required while at the scene or within a short period of time - measured in hours as opposed to days. The traditional cyber forensics approach of seizing a system(s)/media, transporting it to the lab, making a forensic image(s), and then searching the entire system for potential evidence, is no longer appropriate in some circumstances. In cases such as child abductions, pedophiles, missing or exploited persons, time is of the essence. In …


Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier Oct 2016

Development Of A National Repository Of Digital Forensic Intelligence, Mark Weiser, David P. Biros, Greg Mosier

Annual ADFSL Conference on Digital Forensics, Security and Law

Many people do all of their banking online, we and our children communicate with peers through computer systems, and there are many jobs that require near continuous interaction with computer systems. Criminals, however, are also “connected”, and our online interaction provides them a conduit into our information like never before. Our credit card numbers and other fiscal information are at risk, our children's personal information is exposed to the world, and our professional reputations are on the line.

The discipline of Digital Forensics in law enforcement agencies around the nation and world has grown to match the increased risk and …


Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen Oct 2016

Designing A Data Warehouse For Cyber Crimes, Il-Yeol Song, John D. Maguire, Ki Jung Lee, Namyoun Choi, Xiaohua Hu, Peter Chen

Annual ADFSL Conference on Digital Forensics, Security and Law

One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on …


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor Oct 2016

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Proceedings on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …


Environmental Law And Free Trade In The Americas, Jorge Guzman, Mario Mancilla Sep 2016

Environmental Law And Free Trade In The Americas, Jorge Guzman, Mario Mancilla

Distinguished Speaker Series

This July, the Dominican Republic-Central America-US Free Trade Agreement (CAFTA-DR) commemorated its tenth anniversary. The member states –the United States, Guatemala, El Salvador, Honduras, Nicaragua, Costa Rica, and the Dominican Republic-- reaffirmed their shared commitment to promote sound environmental policies that ensure high levels of environmental protection while encouraging trade and investment that is in line with such polices. To its CAFTADR partners, the United States represents their most significant economic partner. Yet, many of these countries face similar challenges associated with the degradation of natural resources, the management of water resources, the enforcement of environmental laws, the illegal trade …


"Prostitution And Criminal Law: A Comparative Perspective, Alberto Cadoppi, Sep 2016

"Prostitution And Criminal Law: A Comparative Perspective, Alberto Cadoppi,

Distinguished Speaker Series

No abstract provided.


Higher Education Reform And The Increased Cost Of Post-Secondary Education In The U.S.: A Policy Review Of Current Policy Plans And Policy Proposals, Arthur C. Evans Iii Sep 2016

Higher Education Reform And The Increased Cost Of Post-Secondary Education In The U.S.: A Policy Review Of Current Policy Plans And Policy Proposals, Arthur C. Evans Iii

South Florida Education Research Conference

Within the last decade, there has been an ever-increasing attention on the need for higher education reform. Measures to mitigate the increased cost and different policy proposals have been introduced to increase the accountability and value. This paper examines current higher education polices and looks at some overarching ideas involved.


Intellectual Property Basics, Christal Sheppard Sep 2016

Intellectual Property Basics, Christal Sheppard

Intellectual Property (IP) Day

No abstract provided.


Regulatory Barriers In The Field Of Gambling: How Much Virtuality Can A Bet Take?, Peter Naessens Mr. Jun 2016

Regulatory Barriers In The Field Of Gambling: How Much Virtuality Can A Bet Take?, Peter Naessens Mr.

International Conference on Gambling & Risk Taking

Bets are a special type of game of chance. In a certain sense, you could think of all games of chance as a bet (bet that the roulette ball comes to rest in number 7, betting on the correct result in the lottery etc.), but most countries have implemented a categorisation. A categorisation that is not only under pressure online, but just as much in the real world with the introduction of virtual bets.

In Belgium, virtual bets were accepted because bets are highly dependent on events, and players also like to make a bet when no events are taking …


Social Casino Gaming: Legal (R)Evolution, Behnam Dayanim Jun 2016

Social Casino Gaming: Legal (R)Evolution, Behnam Dayanim

International Conference on Gambling & Risk Taking

Social games—and social casino games— have exploded in popularity. As of 2012, 800 million people, or 12 percent of the world’s population, were playing social games at least once per month. That number is expected to double to 1.5 billion by the end of 2015.To put that number in perspective, as of 2012, only 50 million people are believed to have participated on real-money online gambling sites. Yet, the legal issues surrounding social casino gaming remain largely unexplored. Only now has litigation tentatively started to explore the outer limits of permissible social gaming. I propose to define "social" and "social …


The Effectiveness Of Self-Regulatory Gambling Advertising Rules On The Protection Of Minors And Vulnerable Persons (Uk Based Study), Margaret Carran Dr Jun 2016

The Effectiveness Of Self-Regulatory Gambling Advertising Rules On The Protection Of Minors And Vulnerable Persons (Uk Based Study), Margaret Carran Dr

International Conference on Gambling & Risk Taking

The liberalisation of the gambling advertising facilitated in the UK by the Gambling Act 2005 led to a natural but phenomenal overall expansion of gambling advertising. While any claims that such gambling marketing may lead to harm continue to be strongly contested, it is at least implicitly accepted that some vulnerable persons, including minors, may require specific protection as mandated by the statutory licensing objective. In the UK this is aimed to be achieved by ensuring that gambling advertisements are ‘socially responsible’ and by the timing/placement restrictions. Compliance is monitored by the ASA that also publishes standards-setting Codes and adjudicates …


Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi May 2016

Sim Card Forensics: Digital Evidence, Nada Ibrahim, Nuha Al Naqbi, Farkhund Iqbal, Omar Alfandi

Annual ADFSL Conference on Digital Forensics, Security and Law

With the rapid evolution of the smartphone industry, mobile device forensics has become essential in cybercrime investigation. Currently, evidence forensically-retrieved from a mobile device is in the form of call logs, contacts, and SMSs; a mobile forensic investigator should also be aware of the vast amount of user data and network information that are stored in the mobile SIM card such as ICCID, IMSI, and ADN. The aim of this study is to test various forensic tools to effectively gather critical evidence stored on the SIM card. In the first set of experiments, we compare the selected forensic tools in …