2,988 research outputs found
Beyond \u3ci\u3eMicrosoft\u3c/i\u3e: A Legislative Solution to the SCA’s Extraterritoriality Problem
The Stored Communications Act governs U.S. law enforcement’s access to cloud data, but the statute is ill equipped to handle the global nature of the modern internet. A pending U.S. Supreme Court case, United States v. Microsoft, raises the question whether a warrant under the statute may be used to reach across international borders to obtain data that is stored in another country, regardless of the user’s nationality. While the Court will determine whether this is an impermissible extraterritorial application of the current law, many have called for a legislative resolution to this issue. Due to the insufficiency of the current law, the limits of traditional judicial doctrines, and the inherent advantages the legislature has over the judiciary in addressing technological change, this Note also recommends a legislative resolution. Building upon a legislative proposal, this Note proposes a framework with two separate sets of legal procedures based on user identity. These separate domestic and extraterritorial procedures provide a framework that would set clear guidelines for law enforcement and service providers while giving due respect to foreign sovereignty
Living in space, book 2, levels D, E, F
In June 1984, President Reagan announced a new NASA program, Operation Liftoff. For more than 25 years NASA has pioneered on the cutting edge of science and technology and has stimulated our young people to strive for excellence in all they do. This program is designed to encourage pupils in the nation's elementary schools to take a greater interest in mathematics and science. Areas addressed include: food, clothing, health, housing, communication, and working in space
Living in Space
Operation Liftoff was designed to encourage pupils in the nation's elementary schools to take a greater interest in mathematics and science. Topics addressed include: food, clothing, health, housing, communication, and working. Each unit consists of background information, a teacher printout (lesson plan), and student liftoff (activities) for levels A, B, and C
A better European Union architecture to fight money laundering. Bruegel Policy Contribution Issue n˚19 | October 2018
A series of banking scandals in multiple EU countries has underlined the shortcomings of Europe's anti-money laundering regime. The impact of these shortcomings has been further underlined by changing geopolitics and by the new reality of European banking union. The imperative of establishing sound supervisory incentives to fight illicit finance effectively demands a stronger EU-level role in anti-money laundering supervision. The authors here detail their plan for a new European unitary architecture, centred on a new European anti-money laundering authority that would work on the basis of deep relationships with national authorities
Airports at Risk: The Impact of Information Sources on Security Decisions
Security decisions in high risk organizations such as airports involve obtaining ongoing and frequent information about potential threats. Utilizing questionnaire survey data from a sample of airport
employees in European Airports across the continent, we analyzed
how both formal and informal sources of security information affect employee's decisions to comply with the security rules and
directives. This led us to trace information network flows to assess its impact on the degree employees making security decisions comply or deviate with the prescribed security rules. The results of the multivariate analysis showed that security information obtained through formal and informal networks differentially determine if employee will comply or not with the rules. Information sources emanating from the informal network tends to encourage employees to be more flexible in their security decisions
while formal sources lead to be more rigid with complying with rules and protocols. These results suggest that alongside the formal administrative structure of airports, there exists a diverse and pervasiveness set of informal communications networks that are a potent factor in determining airport security levels
Approaches to Managing and Collecting Born-Digital Literary Materials for Scholarly Use
Digital Humanities Initiative Level 1 Start Up funding is requested to support a series of site visits and planning meetings among personnel working with the born-digital components of three significant collections of literary material: the Salman Rushdie papers at Emory University's Woodruff Library, the Michael Joyce Papers at the Harry Ransom Humanities Research Center at the University of Texas at Austin, and the Deena Larsen Collection at the Maryland Institute for Technology in the Humanities (MITH) at the University of Maryland. The meetings and site visits will facilitate the preparation of a larger collaborative grant proposal among the three institutions aimed at developing archival tools and best practices for preserving and curating the born-digital documents and records of contemporary authorship. Initial findings will be made available through a jointly authored and publicly distributed online white paper, as well as conference presentations at relevant venues
Superfluid Density and Field-Induced Magnetism in Ba(Fe1-xCox)2As2 and Sr(Fe1-xCox)2As2 Measured with Muon Spin Relaxation
We report muon spin rotation (SR) measurements of single crystal
Ba(FeCo)As and Sr(FeCo)As. From
measurements of the magnetic field penetration depth we find that for
optimally- and over-doped samples, varies monotonically
with the superconducting transition temperature T. Within the
superconducting state we observe a positive shift in the muon precession
signal, likely indicating that the applied field induces an internal magnetic
field. The size of the induced field decreases with increasing doping but is
present for all Co concentrations studied.Comment: 7 pages, accepted for publication in Phys. Rev.
The Passing of Print
This paper argues that ephemera is a key instrument of cultural memory, marking the things intended to be forgotten. This important role means that when ephemera survives, whether accidentally or deliberately, it does so despite itself. These survivals, because they evoke all those other objects that have necessarily been forgotten, can be described as uncanny. The paper is divided into three main sections. The first situates ephemera within an uncanny economy of memory and forgetting. The second focuses on ephemera at a particular historical moment, the industrialization of print in the nineteenth century. This section considers the liminal place of newspapers and periodicals in this period, positioned as both provisional media for information as well as objects of record. The third section introduces a new configuration of technologies – scanners, computers, hard disks, monitors, the various connections between them – and considers the conditions under which born-digital ephemera can linger and return. Through this analysis, the paper concludes by considering digital technologies as an apparatus of memory, setting out what is required if we are not to be doubly haunted by the printed ephemera within the digital archive
KLAN AND COMMONWEALTH: THE KU KLUX KLAN AND POLITICS IN KENTUCKY 1921-1928
The Ku Klux Klan was a major force in American political and social life throughout the better part of the nineteen-twenties. This study examines the Klan, its growth, role, and demise with respect to the Commonwealth of Kentucky. It is largely the story of the Klans failure to develop successfully as it was inhibited by local political factors throughout the Commonwealth
- …
