• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 2
  • 2
  • 2
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Doctrine as Data

Gaitenby, Alan 01 January 2000 (has links)
Doctrine as Data examines the issues and opportunities around machine acquisition and analysis of legal doctrine. This work sought to treat doctrine as data, as a clump of federal appellate case opinion texts, which could be procured and empirically analyzed with information processing technology. Doctrine is a nimble knowledge structure however, existing as a clump as well as a logic where parameters and understandings in case law are constituted. The subject doctrine for this project, compelling interests of the strict scrutiny balancing test, proved to be a logic where notions of legitimate police power and individual rights are established. That logic is flexible, politically sensitive, and responsive, going beyond opinions from a myriad of cases said manifesting doctrine. Doctrine as Data examines information systems and their practices of indexing and accessing appellate case opinions to explore whether these systems are significant to sustaining, or challenging, conceptualizations of doctrine in cases. The examination consists of defining, identifying, and collecting appellate case opinions exhibiting the compelling interest doctrine using the preeminent hard bound and computer legal information systems (i.e. West's digests and reporters and Lexis/Nexis respectively). The project also introduces a new tool, the InQuery search engine from the University of Massachusetts' Center for Intelligent Information Retrieval, to analyze that collection for conceptual coherency attributed to doctrine, i.e. to probe doctrine's presence in, and relationship to, case opinions. It appears however that doctrine exists outside of cases, or rather, is attributed to cases through traditions of legal practice, commentary, and scholarship moreso than in the systems created to manage law's hard data.
2

Exploring cybersecurity requirements in the defense acquisition process

Zeng, Kui 24 September 2016 (has links)
<p> The federal government is devoted to an open, safe, free, and dependable cyberspace that empowers innovation, enriches business, develops the economy, enhances security, fosters education, upholds democracy, and defends freedom. Despite many advantages&mdash; federal and Department of Defense cybersecurity policies and standards, the best military power equipped with the most innovative technologies in the world, and the best military and civilian workforces ready to perform any mission&mdash;the defense cyberspace is vulnerable to a variety of threats. This study explores cybersecurity requirements in the defense acquisition process. The literature review exposes cybersecurity challenges that the government faces in the federal acquisition process, and the researcher examines cybersecurity requirements in defense acquisition documents. The study reveals that cybersecurity is not at a level of importance equal to that of cost, technical, and performance in the current defense acquisition process. The study discloses the defense acquisition guidance does not reflect the change of cybersecurity requirements, and the defense acquisition processes are deficient, ineffective, and inadequate to describe and consider cybersecurity requirements, weakening the government&rsquo;s overall efforts to implement cybersecurity framework into the defense acquisition system. The study recommends defense organizations elevate the importance of cybersecurity during the acquisition process, to help the government&rsquo;s overall efforts to develop, build, and operate in an open, secure, interoperable, and reliable cyberspace. </p>

Page generated in 0.0966 seconds