Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 942

Full-Text Articles in Entire DC Network

Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok Jul 2024

Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok

Indian Journal of Law and Technology

Private sector cyber defence mechanisms are emerging despite existing legislation outlawing use of active defence by individuals and non-state entities. Thus, a key window exists for policy-makers in the possibility of establishing a framework for existing APCD practices that would enable optimal utilisation of private sector capabilities for securing cyber-space at an organizational and national level. This must happen in consonance with circumscribing their operations within the boundaries of the rule of law, both in terms of domestic legislation and international law. This paper seeks to unpack the complexities that underscore each of these challenges and identify avenues towards resolving …


Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi Jul 2024

Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi

Genocide Studies and Prevention: An International Journal

Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).


The Legal Liabilities Of Twitch, Amazon’S Livestreaming Subsidiary, Jean Fang Jun 2024

The Legal Liabilities Of Twitch, Amazon’S Livestreaming Subsidiary, Jean Fang

The Journal of Business, Entrepreneurship & the Law

Amazon’s Twitch is the leader of the video game streaming market, controlling 76% of this market in the Americas and Europe. The video gaming market is rapidly expanding, exceeding its entertainment counterparts, including music and film, by wide margins in profits; experts valued the global gaming market at $229.39 billion in 2022 and expect it to grow to $401.32 billion by 2027. Amazon paid $1 billion to acquire Twitch in 2014 in a business move to capture the views of the gaming audience; on Twitch, popular streamers broadcast themselves playing video games to thousands of devoted fans. Based on recent …


Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper Jun 2024

Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper

Washington Journal of Law, Technology & Arts

Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …


Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton Jun 2024

Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton

DePaul Business & Commercial Law Journal

No abstract provided.


Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod Apr 2024

Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod

University of Miami Law Review

Cyberattacks, data breaches, and ransomware continue to pose major threats to businesses, governments, and health and educational institutions worldwide. Ongoing successful instances of cybercrime involve sophisticated attacks from diverse sources such as organized crime syndicates, actors engaged in industrial espionage, nation-states, and even lone wolf actors having relatively few resources. Technological innovation continues to outpace the ability of U.S. law to keep pace, though other jurisdictions including the European Union have been more proactive. Nation-state and international criminal group ransomware attacks continue; Sony’s systems were hacked by a ransomware group; MGM Resorts disclosed that recovery from their September 2023 hack …


Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou Apr 2024

Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou

Washington Journal of Law, Technology & Arts

This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …


On The Genealogy Of Intimate Digital Harm, Aziz Z. Huq Apr 2024

On The Genealogy Of Intimate Digital Harm, Aziz Z. Huq

Michigan Law Review

A review of The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age. By Danielle Keats Citron.


The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang Mar 2024

The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang

Duke Law & Technology Review

Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.


From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan Jan 2024

From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan

University of Miami Business Law Review

But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …


Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky Jan 2024

Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky

University of Miami Business Law Review

For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …


Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella Jan 2024

Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella

Washington Journal of Law, Technology & Arts

If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.

In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …


Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi Jan 2024

Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi

Cybaris®

No abstract provided.


Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray Jan 2024

Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray

Oklahoma Law Review

No abstract provided.


The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers Jan 2024

The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers

Journal of Law, Technology, & the Internet

This article explores the challenges the New Zealand Government faced after the events in Christchurch on 15 March 2019, where a violent gunman killed 51 people and live-streamed his attack on social media. The video was viewed millions of times in the days following, even as the tech companies took extraordinary efforts to reduce its virality. To find a long-term solution that ended the proliferation of this violent content while protecting human rights, the New Zealand Government decided to take a non-regulatory approach that worked alongside tech companies and civil society. The result was the creation of the Christchurch Call …


The Game-Changer: Legal Issues Surrounding Wearable Technology In Sports, Jack Vande Berg Jan 2024

The Game-Changer: Legal Issues Surrounding Wearable Technology In Sports, Jack Vande Berg

SMU Science and Technology Law Review

Athletes and teams are always seeking to gain a competitive edge, and the emergence of wearable technology has provided them with biometric data that provides new insights into performance. The market for wearable technology has been growing at a rapid pace in recent years and is projected to continue on an upward trajectory through the end of the decade. Governing bodies of sport at a professional and amateur level have adapted regulations for the use of this new technology and the data it produces. This article provides an overview of these current regulations, and then discusses three pressing legal issues. …


Virtual Justice: Criminalizing Avatar Sexual Assault In Metaverse Spaces, Olivia Bellini Jan 2024

Virtual Justice: Criminalizing Avatar Sexual Assault In Metaverse Spaces, Olivia Bellini

Mitchell Hamline Law Review

No abstract provided.


Real-World Consequences For Online Actions: The Case For Expanding Employee Harassment Protection Via Employers’ Rights Of Action, Alexander Barnes Jan 2024

Real-World Consequences For Online Actions: The Case For Expanding Employee Harassment Protection Via Employers’ Rights Of Action, Alexander Barnes

Seattle University Law Review

This Note argues for expanding employers’ access to legal remedies that allow them to recoup the costs of protecting their employees from swatting, doxing, and other online harassment arising from their employees’ professional activity. Part I provides a brief description and history of the online harassment problem and its potentially deadly dangers. Part II describes employers’ legal responsibility to take action to protect their employees from harassment aimed at their employees within the scope of their employment. Part III explores common legal remedies that are currently available to employers, using the state of Washington as an example. Part III also …


Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry Dec 2023

Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry

BYU Law Review

There is a growing gap between technology advancement and a lagging regulatory system. This is particularly problematic in consumer data privacy regulating. Companies hold collected consumer data and determine its use largely without accountability. As a result, ethical questions that carry society-shaping impact are answered in-house, under the influence of groupthink, and are withheld from anyone else weighing in.

This Note poses a solution that would address multiple data privacy regulation issues. Namely, an incentive approach would help even out the information-imbalanced system. Incentives are used as tools throughout intellectual property law to foster commercial progress, discourage trade secrets, and …


Section 230 As Civil Rights Statute, Enrique Armijo Dec 2023

Section 230 As Civil Rights Statute, Enrique Armijo

University of Cincinnati Law Review

Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …


The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta Dec 2023

The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta

Indian Journal of Law and Technology

In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …


Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti Nov 2023

Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti

William & Mary Business Law Review

Non-Fungible Tokens, or “NFTs,” ballooned into a 40-billion-dollar industry in under a decade. Their creators include artists, corporations, entrepreneurs, fraudsters—and even Donald Trump. While NFT owners and traders could be any of us, the parties running the marketplaces are hidden. NFT regulators have yet to be identified. Most alarmingly, the dominant NFT marketplaces are dangerously centralized. Accordingly, the publicized tales of exorbitant or manipulated NFT prices and frequent related scams abound. Meanwhile cryptocurrency—the technology enabling the life of an NFT—remains beset with, at best, theoretical models for effective regulation a full generation after its emergence.

To propose a rational start …


Link Tank Oct 2023

Link Tank

DePaul Magazine

A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.


Full Issue: Fall 2023 Oct 2023

Full Issue: Fall 2023

DePaul Magazine

In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.


Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly Oct 2023

Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly

Akron Law Review

This note addresses the current issues with the law and digital currencies, federal agencies’ current classifications of cryptocurrencies, problems with those classifications, and solutions to better regulate, classify, and prosecute virtual-currency crimes. The history of digital currencies, the history of criminal activity involving money, and how the creation and widespread use of cryptocurrencies has allowed criminals to find new ways to hide money that make it difficult for law enforcement to catch will be discussed. The article analyzes current and past cases involving different courts’ interpretations and prosecution of cryptocurrencies and concludes by offering solutions to the potential issues of …


Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray Oct 2023

Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray

Akron Law Review

This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …


Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp Sep 2023

Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp

Brigham Young University Journal of Public Law

No abstract provided.


Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl Sep 2023

Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl

Marquette Law Review

It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …


Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli Aug 2023

Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli

Brooklyn Journal of International Law

States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …