Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Criminal law (2)
- Privacy (2)
- Algorithmic practices (1)
- Anonymous (1)
- Computer fraud and abuse (1)
-
- Cyber intrusions (1)
- Cyber terrorism (1)
- Cybercrime (1)
- Cyberharassment (1)
- Cyberlaw theory (1)
- Data integrity (1)
- Data science (1)
- Data sharing (1)
- Data trusts (1)
- Exceptionalism (1)
- Expert hackers (1)
- Federal computer crime statute (1)
- Information as a weapon (1)
- Intellectual property (1)
- International humanitarian law (1)
- Law enforcement (1)
- LulzSec (1)
- Personal data (1)
- Statistical prediction (1)
- Virtual reality (1)
- Virtual worlds (1)
Articles 1 - 8 of 8
Full-Text Articles in Entire DC Network
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
The Data Trust Solution To Data Sharing Problems, Kimberly A. Houser, John W. Bagby
Vanderbilt Journal of Entertainment & Technology Law
A small number of large companies hold most of the world’s data. Once in the hands of these companies, data subjects have little control over the use and sharing of their data. Additionally, this data is not generally available to small and medium enterprises or organizations who seek to use it for social good. A number of solutions have been proposed to limit Big Tech “power,” including antitrust actions and stricter privacy laws, but these measures are not likely to address both the oversharing and under-sharing of personal data. Although the data trust concept is being actively explored in the …
The Death Of The Legal Subject, Katrina Geddes
The Death Of The Legal Subject, Katrina Geddes
Vanderbilt Journal of Entertainment & Technology Law
The law is often engaged in prediction. In the calculation of tort damages, for example, a judge will consider what the tort victim’s likely future earnings would have been, but for their particular injury. Similarly, when considering injunctive relief, a judge will assess whether the plaintiff is likely to suffer irreparable harm if a preliminary injunction is not granted. And for the purposes of a child custody evaluation, a judge will consider which parent will provide an environment that is in the best interests of the child.
Relative to other areas of law, criminal law is oversaturated with prediction. Almost …
Borders And Bits, Jennifer Daskal
Borders And Bits, Jennifer Daskal
Vanderbilt Law Review
Our personal data is everywhere and anywhere, moving across national borders in ways that defy normal expectations of how things and people travel from Point A to Point B. Yet, whereas data transits the globe without any intrinsic ties to territory, the governments that seek to access or regulate this data operate with territorial-based limits. This Article tackles the inherent tension between how governments and data operate, the jurisdictional conflicts that have emerged, and the power that has been delegated to the multinational corporations that manage our data across borders as a result. It does so through the lens of …
Virtual Reality Exceptionalism, Gilad Yadin
Virtual Reality Exceptionalism, Gilad Yadin
Vanderbilt Journal of Entertainment & Technology Law
Virtual reality is here. In just a few years, the technology moved from science fiction to the Internet, from specialized research facilities to living rooms. These new virtual reality environments are connected, collaborative, and social-built to deliver a subjective psychological effect that believably simulates spatial physical reality. Cognitive research shows that this effect is powerful enough that virtual reality users act and interact in ways that mirror real-world social and moral norms and behavior.
Contemporary cyberlaw theory is largely based on the notion that cyberspace is exceptional enough to warrant its own specific rules. This premise, a descendant of early …
Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard
Legal Phantoms In Cyberspace: The Problematic Status Of Information As A Weapon And A Target Under International Humanitarian Law, Jack M. Beard
Vanderbilt Journal of Transnational Law
Reports of state-sponsored harmful cyber intrusions abound. The prevailing view among academics holds that if the effects or consequences of such intrusions are sufficiently damaging, international humanitarian law (IHL) should generally govern them--and recourse to armed force may also be justified against states responsible for these actions under the jus ad bellum. This Article argues, however, that there are serious problems and perils in relying on analogies with physical armed force to extend these legal regimes to most events in cyberspace. Armed conflict models applied to the use of information as a weapon and a target are instead likely to …
Hacking For Lulzi: Employing Expert Hackers To Combat Cyber Terrorism, Swathi Padmanabhan
Hacking For Lulzi: Employing Expert Hackers To Combat Cyber Terrorism, Swathi Padmanabhan
Vanderbilt Journal of Entertainment & Technology Law
Because hacking collectives Anonymous and LulzSec have routinely breached supposedly secure computer networks--including Visa, MasterCard, and the Central Intelligence Agency--the threat of cyber terrorism has become more prominent. Many US industries and companies depend on online communication and information storage. If terrorists compromise these capabilities, they could cripple the US economy and perhaps even cause widespread fatalities. Members of Anonymous and LulzSec lack the necessary intent to be prosecuted as cyber terrorists because they hack not to cause fear, but rather to create laughter. Their method of posting all necessary instructions and information regarding intended targets on online message boards …
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
Fantasy Crime: The Role Of Criminal Law In Virtual Worlds, Susan W. Brenner
Vanderbilt Journal of Entertainment & Technology Law
This Article analyzes activity in virtual worlds that would constitute crime if they were committed in the real world. It reviews the evolution of virtual worlds like Second Life and notes research which indicates that more and more of our lives will move into this realm. The Article then analyzes the criminalization of virtual conduct that inflicts "harm" in the real world and virtual conduct that only inflicts "harm" in the virtual world. It explains that the first category qualifies as cybercrime and can be prosecuted under existing law. Finally, it analyzes the necessity and propriety of criminalizing the second …
The Computer Fraud And Abuse Act Of 1986: A Measured Response To A Growing Problem, Dodd S. Griffith
The Computer Fraud And Abuse Act Of 1986: A Measured Response To A Growing Problem, Dodd S. Griffith
Vanderbilt Law Review
Before the invention of the computer, the amount of property an individual could steal or destroy was, to some extent, determined by physical limitations. Criminals could take only as much property as they could carry or arrange to transport. For example, the average amount of money taken in a bank robbery has been estimated to be about ten thousand dollars. Crime has, however, changed with the times. A criminal can use modern technology to transfer extremely large sums of money that formerly would have been impossible to remove without detection. A 1984 study conducted by the American Bar Association Task …