Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Commodity Futures Returns And Policy Uncertainty, Deepa Bannigidadmath, Paresh Kumar Narayan Mar 2021

Commodity Futures Returns And Policy Uncertainty, Deepa Bannigidadmath, Paresh Kumar Narayan

Research outputs 2014 to 2021

© 2020 Elsevier Inc. This paper investigates whether economic policy uncertainty is predictable using three sets of commodity futures market variables, namely the equal-weighted average of futures excess returns, the excess returns on a portfolio of going long in backwardated commodities, and the excess returns on a portfolio of going short in contango commodities as predictors. We find significant evidence of both in-sample and out-of-sample predictability. Combination forecasts also reveal strong evidence of predictability. Our findings remain unchanged following several robustness tests.


From The Tree Of Knowledge And The Golem Of Prague To Kosher Autonomous Cars: The Ethics Of Artificial Intelligence Through Jewish Eyes, Nachshon Goltz, John Zeleznikow, Tracey Dowdeswell Jul 2020

From The Tree Of Knowledge And The Golem Of Prague To Kosher Autonomous Cars: The Ethics Of Artificial Intelligence Through Jewish Eyes, Nachshon Goltz, John Zeleznikow, Tracey Dowdeswell

Research outputs 2014 to 2021

This article discusses the regulation of artificial intelligence from a Jewish perspective, with an emphasis on the regulation of machine learning and its application to autonomous vehicles and machine learning. Through the Biblical story of Adam and Eve as well as Golem legends from Jewish folklore, we derive several basic principles that underlie a Jewish perspective on the moral and legal personhood of robots and other artificially intelligent agents. We argue that religious ethics in general, and Jewish ethics in particular, show us that the dangers of granting moral personhood to robots and in particular to autonomous vehicles lie not …


Generalized Correlation Measures Of Causality And Forecasts Of The Vix Using Non-Linear Models, David E. Allen, Vince J. Hooper Jan 2018

Generalized Correlation Measures Of Causality And Forecasts Of The Vix Using Non-Linear Models, David E. Allen, Vince J. Hooper

Research outputs 2014 to 2021

This paper features an analysis of causal relations between the daily VIX, S & P500 and the daily realised volatility (RV) of the S & P500 sampled at 5 min intervals, plus the application of an Artificial Neural Network (ANN) model to forecast the future daily value of the VIX. Causal relations are analysed using the recently developed concept of general correlation Zheng et al. and Vinod. The neural network analysis is performed using the Group Method of Data Handling (GMDH) approach. The results suggest that causality runs from lagged daily RV and lagged continuously compounded daily return on the …


Mapping The Laws Which Apply To Intercepting Wireless Communications In A Western Australian Legal Context, Tim Thomas, Craig Valli Jan 2015

Mapping The Laws Which Apply To Intercepting Wireless Communications In A Western Australian Legal Context, Tim Thomas, Craig Valli

Australian Digital Forensics Conference

The rapid evolution and deployment of WiFi technology creates a new environment where offenders can intercept and obtain sensitive information for use in the commissioning of further criminal activity. This paper explores how the law applies to an protects the wireless communications environment, with specific focus on the interception of WiFi data communications.


I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone Jan 2014

I Remember Richelieu: Is Anything Secure Anymore?, Michael G. Crowley, Michael N. Johnstone

Australian Security and Intelligence Conference

Petraeus-gate, hacked nude celebrity photos in the cloud and the recent use of a search and seizure warrant in the United States of America to seek production of customer email contents on an extraterritorial server raises important issues for the supposably safe storage of data on the World Wide Web. Not only may there be nowhere to hide in cyberspace but nothing in cyberspace may be private. This paper explores the legal and technical issues raised by the these matters with emphasis on the courts decision “In the Matter of a Warrant to Search a Certain E-Mail Account Controlled and …


Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova Dec 2009

Case Study On An Investigation Of Information Security Management Among Law Firms, Sameera Mubarak, Elena Sitnikova

Australian Information Security Management Conference

The integrity of lawyers trust accounts as come under scrutiny in the last few years. There have been many incidents of trust account fraud reported internationally, including a case in Australia, where an employee of a law firm stole $4,500,000 from the trust funds of forty-two clients. Our study involved interviewing principles of ten law companies to find out solicitors’ attitudes to computer security and the possibility of breaches of their trust accounts. An overall finding highlights that law firms were not current with technology to combat computer crime, and inadequate access control was a major concern in safeguarding account …