Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Publication
- File Type
Articles 1 - 6 of 6
Full-Text Articles in Social and Behavioral Sciences
Paper Dragon Thieves, J.S. Nelson
Paper Dragon Thieves, J.S. Nelson
J.S. Nelson
The Corporate Shell Game, J.S. Nelson
The Corporate Shell Game, J.S. Nelson
J.S. Nelson
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
The Greening Of Canadian Cyber Laws: What Environmental Law Can Teach And Cyber Law Can Learn, Sara Smyth
Sara Smyth
This article examines whether Canadian environmental law and policy could serve as a model for cyber crime regulation. A wide variety of offences are now committed through digital technologies, including thievery, identity theft, fraud, the misdirection of communications, intellectual property theft, espionage, system disruption, the destruction of data, money laundering, hacktivism, and terrorism, among others. The focus of this Article is on the problem of data security breaches, which target businesses and consumers. Following the Introduction, Part I provides an overview of the parallels that can be drawn between threats in the natural environment and on the Internet. Both disciplines …
Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg
Labor Market Data Needs Relating To Antidiscrimination Activity: Comment, Ronald Ehrenberg
Ronald G. Ehrenberg
[Excerpt] Barbara Bergmann's background paper divides data needs in the antidiscrimination area into data that would be useful in the formulation of national policy and data that would be useful as an aid in enforcing the laws and executive orders against discrimination. Although the former are likely to be of greatest concern to the commission, she has performed a valuable service by discussing these interrelated needs in one place. I find much to agree with, and very little to disagree with or question, in her paper. The presentation is, in the main, an objective one and she tempers her desire …
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael
Professor Katina Michael
Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.
Estate Acts, 1600 To 1830: A New Source For British History, Gary Richardson
Estate Acts, 1600 To 1830: A New Source For British History, Gary Richardson
Gary Richardson
A new database demonstrates that between 1600 and 1830, Parliament passed thousands of acts restructuring rights to real and equitable estates. These estate acts enabled individuals and families to sell, mortgage, lease, exchange, and improve land previously bound by landholding and inheritance laws. This essay provides a factual foundation for research on this important topic: the law and economics of property rights during the period preceding the Industrial Revolution. Tables present time-series, cross-sectional, and panel data that should serve as a foundation for empirical analysis. Preliminary analysis indicates ways in which this new evidence may shape our understanding of British …