Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
22
result(s) for
"Computer crimes United States Case studies."
Sort by:
The United States of Anonymous
2022
In The United States of
Anonymous , Jeff Kosseff explores how the
right to anonymity has shaped American values, politics, business,
security, and discourse, particularly as technology has enabled
people to separate their identities from their
communications.
Legal and political debates surrounding online privacy often
focus on the Fourth Amendment's protection against unreasonable
searches and seizures, overlooking the history and future of an
equally powerful privacy right: the First Amendment's protection of
anonymity. The United States of Anonymous features
extensive and engaging interviews with people involved in the
highest profile anonymity cases, as well as with those who have
benefited from, and been harmed by, anonymous communications.
Through these interviews, Kosseff explores how courts have
protected anonymity for decades and, likewise, how law and
technology have allowed individuals to control how much, if any,
identifying information is associated with their communications.
From blocking laws that prevent Ku Klux Klan members from wearing
masks to restraining Alabama officials from forcing the NAACP to
disclose its membership lists, and to refusing companies' requests
to unmask online critics, courts have recognized that anonymity is
a vital part of our free speech protections.
The United States of Anonymous weighs the tradeoffs
between the right to hide identity and the harms of anonymity,
concluding that we must maintain a strong, if not absolute, right
to anonymous speech.
CRACK99 : the takedown of a $100 million Chinese software pirate /
The \"story of the biggest software piracy case prosecuted by the U.S. Department of Justice\"--Amazon.com.
Reaching and engaging people: Analyzing tweeting practices of large U.S. police departments pre- and post- the killing of George Floyd
2022
Finding ways to improve police legitimacy and police-community relations has for long been an important social issue in the United States. It becomes particularly urgent following the murder of George Floyd on May 25 th , 2020. An emerging area that holds potential in remediating police-community relations pertains to the use of social media by police. Yet, this body of research stays highly exploratory (e.g., case studies based on a small sample of agencies) and different viewpoints exist regarding the objectives of police social media usage. The current study identified 115 large police departments in the U.S. and collected their tweets over a 4-month period between 4/1/2020 and 7/31/2020. We investigated how police agencies (both individually and as an aggregate) leveraged social media to respond to the nationwide protests directed at the police and community reactions to such responses. We found that police agencies tweeted more frequently in the immediate aftermath of the murder and posted an increased number of civil-unrest related tweets. The public showed a greater interest in engaging with law enforcement agencies (i.e., average favorite and retweet counts) following the murder. A great variability emerged across agencies in their responses on social media, suggesting that examining only a handful of agencies or a particular dimension of social media usage would limit our understanding of police behaviors and citizen interactions on social media. In conclusion, we suggested a few avenues for future research (and practices) on responsible and effective use of social media by police, while pointing out the challenges associated with such inquiries.
Journal Article
Trends in illegal wildlife trade: Analyzing personal baggage seizure data in the Pacific Northwest
2020
The illegal import of wildlife and wildlife products is a growing concern, and the U.S. is one of the world's leading countries in the consumption and transit of illegal wildlife and their derivatives. Yet, few U.S. studies have analyzed the illegal wildlife trade (IWT) on a national or local scale. Moreover, to our knowledge, no studies have specifically examined the trends associated with IWT moving through personal baggage. This work aimed to better understand the magnitude of illegal wildlife importation into U.S. ports of entry by determining trends associated with illegal wildlife products from personal baggage seizures, using the Pacific Northwest (PNW) as a specific case study. To identify the most influential factors determining the numbers and types of personal baggage seizures into PNW, we analyzed 1,731 records between 1999 and 2016 from the Fish and Wildlife Service's (FWS) Law Enforcement Management Information System (LEMIS) database. We found five significant contributors: taxonomic classification of wildlife, categorical import date, wildlife product, source region, and the Convention on International Trade in Endangered Species of Wild Fauna and Flora (CITES) status. While wildlife seizures across taxonomic categories have generally decreased in the PNW since 2008, other findings provide a reason for concern. More specifically, mammals were identified as the largest animal group of seized wildlife, and temporal trends indicate increases in seizures for this and several other taxonomic groups. Many of the seizures originated from overseas, with East Asia serving as the largest source. Our PNW case study can be a model for how large-scale geographical seizure data can be used to inform about the major factors that have historically and presently contribute to IWT, with conservation implications globally.
Journal Article
Resilience in the Internet of Medical Things: A Review and Case Study
2024
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies.
Journal Article
Qualitative case study of needle exchange programs in the Central Appalachian region of the United States
by
Baus, Adam
,
Fisher, Melanie
,
Davidov, Danielle
in
Acquired immune deficiency syndrome
,
AIDS
,
Analysis
2018
The Central Appalachian region of the United States is in the midst of a hepatitis C virus epidemic driven by injection of opioids, particularly heroin, with contaminated syringes. In response to this epidemic, several needle exchange programs (NEP) have opened to provide clean needles and other supplies and services to people who inject drugs (PWID). However, no studies have investigated the barriers and facilitators to implementing, operating, and expanding NEPs in less populous areas of the United States.
This qualitative case study consisted of interviews with program directors, police chiefs, law enforcement members, and PWID affiliated with two NEPs in the rural state of West Virginia. Interview transcripts were coded inductively and analyzed using qualitative data analysis software. Final common themes related to barriers and facilitators of past program openings, current program operations, and future program plans, were derived through a consensus of two data coders.
Both NEPs struggled to find existing model programs, but benefited from broad community support that facilitated implementation. The largest operational barrier was the legal conundrum created by paraphernalia laws that criminalize syringe possession. However, both PWID and law enforcement appreciated the comprehensive services provided by these programs. Program location and transportation difficulties were additional noted barriers. Future program operations are threatened by funding shortages and bans, but necessitated by unexpected program demand.
Despite broad community support, program operations are threatened by growing participant volumes, funding shortages, and the federal government's prohibition on the use of funds to purchase needles. Paraphernalia laws create a legal conundrum in the form of criminal sanctions for the possession of needles, which may inadvertently promote needle sharing and disease transmission. Future studies should examine additional barriers to using clean needles provided by rural NEPs that may blunt the effectiveness of NEPs in preventing disease transmission.
Journal Article
Higher Education Grants or Gifts of Interest to African Americans
Here is this week’s news of grants or gifts to historically Black colleges and universities or for programs of particular interest to African Americans in higher education.
Journal Article
Global Networks and Local Values
by
National Research Council (U.S.). Computer Science and Telecommunications Board
,
National Research Council (U.S.). Committee to Study Global Networks and Local Values
in
Case studies
,
Computer networks
,
Economic aspects
2002,2001,2004
Whether you call it the third wave, the information revolution, or the virtually connected world, the implications of a global information network are profound. As a society, we want to forestall the possible negative impacts without closing the door to the potential benefits. But how?
Global Networks and Local Values provides perspective and direction, focusing on the relationship between global information networks and local values-that is, the political, economic, and cultural norms that shape our daily lives. This book is structured around an illuminating comparison between U.S. and German approaches toward global communication and information flow. (The United States and Germany are selected as two industrialized, highly networked countries with significant social differences.)
Global Networks and Local Values captures the larger context of technology and culture, explores the political and commercial institutions where the global network functions, and highlights specific issues such as taxation, privacy, free speech, and more. The committee contrasts the technical uniformity that makes global communication possible with the diversity of the communities being served and explores the prospects that problems resulting from technology can be resolved by still more technology. This thoughtful volume will be of interest to everyone concerned about the social implications of the global Internet.
The Law of the Zebra
2013
At the dawn of internet law, scholars and judges debated whether a \"law of the horse\"—a set of specific laws addressing technology problems—was ever needed. Time has demonstrated that in some cases, the answer is yes. However, some courts are confused about the appropriate trajectory of contract law in technology contexts. Today, a technology-centric analysis threatens to subvert traditional contract law and the future of entrepreneurship, and circuit splits have emerged in what might be called an undesirable \"law of the zebra.\" Do contracts that involve technology always require exceptional contract rules? In particular, does the use of a computer to breach a contract make the breach inherently worse in law? Using the Computer Fraud and Abuse Act (\"CFAA\") as a case study, this Article introduces a paradigm of \"restrained technology exceptionalism\" in contract law, a paradigm predicated on a return to traditional contract law principles and contractual supremacy over technology exceptionalist legal approaches. Applying the restrained technology exceptionalism paradigm to a circuit split concerning the CFAA, this Article then introduces a \"privity\" model bridging contract law with CFAA analysis, which inverts the traditional legal framing of the CFAA and contract relationship. It argues that where contract formation has occurred, the contract controls the relationship and only contract remedies are appropriate; both criminal and civil CFAA analysis becomes inapposite and should not be considered. Thus, the operative legal question is not whether contract breach revokes authorization in CFAA context. Rather, it is whether contract analysis is possible, thereby rendering the CFAA unnecessary and redundant in contractual contexts.
Journal Article