Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Social and Behavioral Sciences

Paper Dragon Thieves, J.S. Nelson Dec 2016

Paper Dragon Thieves, J.S. Nelson

J.S. Nelson

Developments in the law are making the corporate form more opaque and allowing the agents who animate it to escape individual accountability for their actions. The law now provides protection for agents to engage in widespread frauds that inflict massive harm on the public. This article challenges the academic orthodoxy that shareholder and director liability are enough to control agent behavior by developing a paper dragon analogy to focus on the importance of agents in corporate animation. Lack of agent accountability encourages the patterns of fraud that caused the financial crisis in which forty-five percent of the world’s wealth disappeared, …


The Corporate Shell Game, J.S. Nelson Dec 2015

The Corporate Shell Game, J.S. Nelson

J.S. Nelson

This Article identifies for the first time the hardening of the corporate shell. It provides compelling evidence that shell-hardening pushes and disguises the way that corporations and agents commit large-scale wrongdoing, and it traces the contributing legal streams that protect the agents who engage in this behavior. The only way to combat widespread frauds that inflict damage on the public is for the corporate shell to be-come less opaque.


The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth Aug 2015

The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth

Sara Smyth

This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …


Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg Jul 2013

Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg

Ronald G. Ehrenberg

[Excerpt] Barbara Bergmann's background paper divides data needs in the antidiscrimination area into data that would be useful in the formulation of national policy and data that would be useful as an aid in enforcing the laws and executive orders against discrimination. Although the former are likely to be of greatest concern to the commission, she has performed a valuable service by discussing these interrelated needs in one place. I find much to agree with, and very little to disagree with or question, in her paper. The presentation is, in the main, an objective one and she tempers her desire …


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


Estate Acts, 1600 To 1830: A New Source For British History, Gary Richardson Dec 2007

Estate Acts, 1600 To 1830: A New Source For British History, Gary Richardson

Gary Richardson

A new database demonstrates that between 1600 and 1830, Parliament passed thousands of acts restructuring rights to real and equitable estates. These estate acts enabled individuals and families to sell, mortgage, lease, exchange, and improve land previously bound by landholding and inheritance laws. This essay provides a factual foundation for research on this important topic: the law and economics of property rights during the period preceding the Industrial Revolution. Tables present time-series, cross-sectional, and panel data that should serve as a foundation for empirical analysis. Preliminary analysis indicates ways in which this new evidence may shape our understanding of British …