Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Legal Studies

Journal

Institution
Keyword
Publication

Articles 1 - 30 of 43

Full-Text Articles in Law

Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh Dec 2017

Feeding The Machine: Policing, Crime Data, & Algorithms, Elizabeth E. Joh

William & Mary Bill of Rights Journal

No abstract provided.


The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm Dec 2017

The Investigative Dynamics Of The Use Of Malware By Law Enforcement, Paul Ohm

William & Mary Bill of Rights Journal

The police have started to use malware—and other forms of government hacking—to solve crimes. Some fear coming abuses—the widespread use of malware when traditional investigative techniques would work just as well or to investigate political opponents or dissident speakers. This Article argues that these abuses will be checked, at least in part, by the very nature of malware and the way it must be controlled. This analysis utilizes a previously unformalized research methodology called “investigative dynamics” to come to these conclusions. Because every use of malware risks spoiling the tool—by revealing a software vulnerability that can be patched—the police will …


Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy Dec 2017

Postmodern Social Control: Dividuals And Surveillance, Ernest M. Oleksy

The Downtown Review

As a society's foundational philosophy changes, so, too, will its forms of social control. By using the works of thinkers like Deleuze and Foucault as pivot points, the dynamic nature of social interactions and the agents to mediate those actions shall be investigated. This article includes findings from archival analysis written in a journalistic prose for simplicity of consumption.


Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr. Dec 2017

Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.

Journal of Digital Forensics, Security and Law

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as …


Ethics And The “Root Of All Evil” In Nineteenth Century American Law Practice, Michael Hoeflich Oct 2017

Ethics And The “Root Of All Evil” In Nineteenth Century American Law Practice, Michael Hoeflich

St. Mary's Journal on Legal Malpractice & Ethics

This Article discusses the bifurcated notions on the purpose of working as an attorney—whether the purpose is to attain wealth or whether the work in and of itself is the purpose. This Article explores the sentiments held by distinguished and influential nineteenth-century lawyers—particularly David Hoffman and George Sharswood—regarding the legal ethics surrounding attorney’s fees and how money in general is the root of many ethical dilemmas within the arena of legal practice. Through the texts of Hoffman and Sharswood, we find the origins of the ethical rules all American attorneys are subject to in their various jurisdictions.


Material Support Laws And Critical Race Theory, Nichole M. Pace Sep 2017

Material Support Laws And Critical Race Theory, Nichole M. Pace

Access*: Interdisciplinary Journal of Student Research and Scholarship

The paper examines terrorism designation and material support laws for structural racism using Critical Race Theory. Legislation concerning terrorist organizations continues to limit efforts of humanitarian organizations and refugee applicants. The impact of such legislation extends beyond the designated terrorist organizations to the communities and countries they inhabit. This article describes the legal statutes and issues related to terrorist designation and material support laws before defining Critical Race Theory. The article seeks to understand the structural racism involved in the defined statutes and procedures. Using Critical Race Theory, the article defines how material support laws and terrorist designation procedures are …


Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James Sep 2017

Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James

Journal of Digital Forensics, Security and Law

Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …


Fss 2020: Pension Sector, Zarah Gadzama Sep 2017

Fss 2020: Pension Sector, Zarah Gadzama

Bullion

The Nigerian Pensioner over the years is seen to have been deprived of his/her benefits even after retirement. The inconsistency of payments, corruption and lack of data or payments to Ghost Pensioners was a major setback to the defined benefits pension scheme of the Federal Government. To curtail these challenges, the Federal Government commenced the reform of the sector through legislative reforms to create a robust Pension industry that can meet the needs of all pensioners. This Paper intends to review the Journey So for of the FSS2020 Pension Sector. The paper ls divided into five Sections; Section one deals …


Prosecuting Buyers In Human Trafficking Cases: An Analysis Of The Implications Of United States V. Jungers And United States V. Bonestroo, Andrea J. Nichols, Erin Heil Sep 2017

Prosecuting Buyers In Human Trafficking Cases: An Analysis Of The Implications Of United States V. Jungers And United States V. Bonestroo, Andrea J. Nichols, Erin Heil

Dignity: A Journal of Analysis of Exploitation and Violence

This article provides a review and analysis of United States v. Jungers and United States v. Bonestroo, important court cases providing precedent for charging buyers of sex as traffickers in cases involving minors. The decisions in these court cases, and in subsequent cases, further solidify the presence of end-demand efforts in the form of prosecution. Yet, the decisions in these cases raise additional questions about their implications for state-level prosecution, the prosecution of buyers in cases involving adults who experience sex trafficking, and the buyers of trafficked labor. Drawing from an analysis of relevant cases, this article analyzes the …


Femmes, Migration, Et Prostitution En Europe: Il N’Est Pas Question De “Travail De Sexe”, Anna Zobnina Sep 2017

Femmes, Migration, Et Prostitution En Europe: Il N’Est Pas Question De “Travail De Sexe”, Anna Zobnina

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Volume 1, Issue 1 (2017) Inaugural Issue Aug 2017

Volume 1, Issue 1 (2017) Inaugural Issue

International Journal on Responsibility

Contents:

1 – 4 Terry Beitzel, Who is Responsible to do what for Whom? A letter from the Editor-in-Chief.

5 – 20 Arun Gandhi, What Does Responsibility Mean to Me?

21 – 42 T.Y. Okosun, Political Flip-flopping, Political Responsibility, Current Governance, and the Disenfranchised.

43 – 54 Hal Pepinsky, Resolving the Paradox of Holding People Responsible.

55 – 66 Kendra A. Hollern, Dying with Dignity: Where is the Compassion in Compassionate Release Programs?

67 – 82 Sabiha Shala & Gjylbehare Muharti, Who is Responsible for Ethical Legal Education, for what and to whom? Case of Kosovo.

83 Acknowledgments.


Re-Reading Legal Realism And Tracing A Genealogy Of Balancing, Curtis Nyquist Aug 2017

Re-Reading Legal Realism And Tracing A Genealogy Of Balancing, Curtis Nyquist

Buffalo Law Review

No abstract provided.


Utilizing Title Vi As A Means To Eradicate Health Discrimination, Adrian D. Samuels, Mariah L. Cole Jul 2017

Utilizing Title Vi As A Means To Eradicate Health Discrimination, Adrian D. Samuels, Mariah L. Cole

Journal of Health Disparities Research and Practice

Health disparities among people of color are persistent and detrimental to the overall wellness of these groups. Discrimination in the provision of health care services is one of the primary causes of health disparities. Title VI of the Civil Rights Act of 1964’s availability as a tool to prevent discrimination and, in turn, disparities among these groups is underdocumented. The legislative intent of Title VI and the historical context of the law have been helpful in its use outside of the health care arena to prevent discrimination. This sheds light on the ways that the law can influence the health …


Today's Porn: Not A Constitutional Right; Not A Human Right, Patrick Trueman Jul 2017

Today's Porn: Not A Constitutional Right; Not A Human Right, Patrick Trueman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman Jul 2017

Amend The Communications Decency Act To Protect Victims Of Sexual Exploitation, Samantha Vardaman

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes Jul 2017

Introduction To Dignity Special Issue: Freedom From Sexploitation, Lisa L. Thompson, Donna M. Hughes

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Inextricably Bound: Strip Clubs, Prostitution, And Sex Trafficking, Dan O'Bryant Jul 2017

Inextricably Bound: Strip Clubs, Prostitution, And Sex Trafficking, Dan O'Bryant

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Solitary Confinement: Social Death And Its Afterlives, Jen Rushforth May 2017

Solitary Confinement: Social Death And Its Afterlives, Jen Rushforth

Themis: Research Journal of Justice Studies and Forensic Science

No abstract provided.


Minimum Education Requirements For Crime Scene Investigators, Araseli Saldivar May 2017

Minimum Education Requirements For Crime Scene Investigators, Araseli Saldivar

Themis: Research Journal of Justice Studies and Forensic Science

The initial crime scene investigation is critical since it is the primary step in the investigative process; therefore, individuals assigned to process a scene should be highly educated. Improperly educated (or uneducated) crime scene investigators (CSIs) can mishandle evidence during an investigation, affecting the outcome of cases. The minimum education requirement for CSIs should transition from a high school diploma—the current requirement—toward a bachelor’s degree. The importance of acquiring a college-level education is observed in a study conducted on crime scene examiners in Australia. To determine the educational requirement for CSIs in the United States, information was gathered electronically from …


Optimizing Collection Of Trace Biological Samples From Vehicle Headrests, Kevin Tang, Jesse Ramirez, John Bond, Jocelyn Weart, Yvette Delatorre, Ian Fitch, Steven Lee May 2017

Optimizing Collection Of Trace Biological Samples From Vehicle Headrests, Kevin Tang, Jesse Ramirez, John Bond, Jocelyn Weart, Yvette Delatorre, Ian Fitch, Steven Lee

Themis: Research Journal of Justice Studies and Forensic Science

Tape-lifting and swabbing are two methods commonly used for collecting biological samples in the United Kingdom and United States to investigate vehicle crimes. Determining the optimal collection method may lead to an increase in generating DNA profiles and crime-solving. The objective of this study is to evaluate the efficiency of adhesive tape and the double-swab collection methods for investigating vehicle crimes with possible touch DNA samples. Two experiments were conducted to evaluate the use of tape-lifts and swabs on spiked common vehicle fabric materials. The efficiency of recovery between the two collection methods was performed using qPCR. The results from …


Forensics’ Fight: A Need For Aggressive Strategies Against Confirmation Bias, Madison Mcgowan May 2017

Forensics’ Fight: A Need For Aggressive Strategies Against Confirmation Bias, Madison Mcgowan

Themis: Research Journal of Justice Studies and Forensic Science

In 2009, the National Academy of Sciences produced a lengthy report illuminating significant weaknesses present within the forensic community. One complex fault found in forensics was conformation bias. Since it is within human nature to make decisions based on contextual information, assumptions, and pre-held opinions, confirmation bias is an issue that will continue to persist. Therefore, stronger efforts must be made to recognize and abate the problem of bias within the field of forensics in order to preserve the notion that forensic science exists to serve principles of both truth and justice. Accordingly, this paper argues for the fight against …


Physical Match: Unique Fracture Patterns In Wooden Popsicle Sticks, Yiu Ming Sunny Lau May 2017

Physical Match: Unique Fracture Patterns In Wooden Popsicle Sticks, Yiu Ming Sunny Lau

Themis: Research Journal of Justice Studies and Forensic Science

Physical match (or physical fit) evidence was considered reliable in court for years, until the Daubert case, which required standardized scientific methodology on all forensic evidence. Physical matching faces the same criticism as other forms of physical evidence (specifically, that it lacks a scientific foundation). Physical matching is based on the idea that when an object is fractured, the shape of each fragment is unique and it is not possible to recreate a fragment that is identical to any other. In this study, fifty wooden popsicle sticks were broken in half, the pieces were mixed, and then reconstructed using physical …


Jurisdiction, Privacy, And Ownership: Dna Technology And Field Dynamics In Conflict-Related Mass Fatalities, Stefan Schmitt, Dallas Mazoori May 2017

Jurisdiction, Privacy, And Ownership: Dna Technology And Field Dynamics In Conflict-Related Mass Fatalities, Stefan Schmitt, Dallas Mazoori

Genocide Studies and Prevention: An International Journal

This article explores the dynamics and challenges of undertaking human identifications in states experiencing armed conflict or emerging therefrom. It emphasises the integral role of the State in human identifications and the need for the legal acts of the State in identifying an individual and confirming their death to be integrated into any humanitarian response to repatriating the dead. Conflict-related mass fatalities occur in uncontrolled circumstances, making DNA-based human identifications necessary. In states lacking the necessary forensic infrastructure, the promise of expedited human identifications through outsourcing DNA work can lead to the State abdicating the necessary jurisdiction and scientific transparency …


Putting An End To The Silence: Educating Society About The Canadian Residential School System, Jamie Lee Kuhl Apr 2017

Putting An End To The Silence: Educating Society About The Canadian Residential School System, Jamie Lee Kuhl

Bridges: An Undergraduate Journal of Contemporary Connections

This paper advocates for the increased education of Canadian society regarding the Indian Residential School System. Many Canadian’s tend to be uninformed on the history of the schools and as a result risk subjecting Aboriginal peoples to further harm. The contents of this paper demonstrates by informing all Canadian citizens of the truth regarding the assimilative schools and their enduring legacy on Aboriginal peoples, several benefits can occur. Specifically, through revealing the truth regarding the residential schools, healing becomes possible for victims, over-representation within the criminal justice system can be better understood as well as addressed, and future harm can …


Eliminating Circuit-Split Disparities In Federal Sentencing Under The Post-Booker Guidelines, Elliot Edwards Apr 2017

Eliminating Circuit-Split Disparities In Federal Sentencing Under The Post-Booker Guidelines, Elliot Edwards

Indiana Law Journal

This Note will explore the rarely discussed consequences that result when courts of appeals freely interpret the Sentencing Guidelines. This Note will not address appellate review of sentences in general, nor will it discuss disparities caused by trial courts. Instead, the discussion below will address a very specific situation, namely when a court of appeals vacates a sentence because, in its estimation, the trial court misapplied the Guidelines. Part I will relate the history of the recent sentencing re-form movement in America, noting particularly which bodies have the authority to decide sentencing policy. Part II will then analyze the interpretive …


A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald Mar 2017

A Forensic Email Analysis Tool Using Dynamic Visualization, Johannes Stadlinger, Andreas Dewald

Journal of Digital Forensics, Security and Law

Communication between people counts to the most important information of today’s business. As a result, in case of forensic investigations in big companies, analysis of communication data in general and especially email, as the still most widely used business communication platform with an immense and still growing volume, is a typical task in digital forensics. One of the challenges is to identify the relevant communication partners and structures in the suspects surrounding as quickly as possible in order to react appropriately and identify further targets of evaluation. Due to the amount of emails in typical inboxes, reading through all the …


Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger Mar 2017

Find Me If You Can: Mobile Gps Mapping Applications Forensic Analysis & Snavp The Open Source, Modular, Extensible Parser, Jason Moore, Ibrahim Baggili, Frank Breitinger

Journal of Digital Forensics, Security and Law

The use of smartphones as navigation devices has become more prevalent. The ubiquity of hand-held navigation devices such as Garmins or Toms Toms has been falling whereas the ownership of smartphones and their adoption as GPS devices is growing. This work provides a comprehensive study of the most popular smartphone mapping applications, namely Google Maps, Apple Maps, Waze, MapQuest, Bing, and Scout, on both Android and iOS. It details what data was found, where it was found, and how it was acquired for each application. Based on the findings, the work allowed for the construction of a tool capable of …


Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D. Mar 2017

Compression Of Virtual-Machine Memory In Dynamic Malware Analysis, James E. Fowler Ph.D.

Journal of Digital Forensics, Security and Law

Lossless compression of memory dumps from virtual machines that run malware samples is considered with the goal of significantly reducing archival costs in dynamic-malware-analysis applications. Given that, in such dynamic-analysis scenarios, malware samples are typically run in virtual machines just long enough to activate any self-decryption or other detection- avoidance maneuvers, the virtual-machine memory typically changes little from that of the baseline state, with the difference being attributable in large degree to the loading of additional executables and libraries. Consequently, delta coding is proposed to compress the current virtual-machine memory dump by coding its differences with respect to a predicted …


Table Of Contents Mar 2017

Table Of Contents

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Mar 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.