Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- UIC School of Law (175)
- Schulich School of Law, Dalhousie University (58)
- University of Michigan Law School (56)
- University of Richmond (52)
- Maurer School of Law: Indiana University (49)
-
- Vanderbilt University Law School (39)
- The Catholic University of America, Columbus School of Law (33)
- Duke Law (27)
- American University Washington College of Law (25)
- Brooklyn Law School (24)
- Brigham Young University Law School (22)
- University of Washington School of Law (22)
- Pepperdine University (20)
- Seattle University School of Law (18)
- Southern Methodist University (17)
- University of Maryland Francis King Carey School of Law (17)
- Washington and Lee University School of Law (17)
- Fordham Law School (15)
- University of Georgia School of Law (13)
- Villanova University Charles Widger School of Law (12)
- New York Law School (10)
- Pace University (10)
- Universitas Indonesia (10)
- University of Miami Law School (9)
- University of Oklahoma College of Law (9)
- University of San Diego (8)
- William & Mary Law School (8)
- Case Western Reserve University School of Law (7)
- University of Minnesota Law School (7)
- West Virginia University (7)
- Keyword
-
- Internet (124)
- Privacy (46)
- Technology (37)
- Cybersecurity (36)
- Cyberspace (33)
-
- First Amendment (27)
- Regulation (25)
- Social media (24)
- Communications Decency Act (23)
- Freedom of speech (21)
- Censorship (15)
- CDA (14)
- Information (14)
- Cyberlaw (13)
- Federal Trade Commission (13)
- Cyber (12)
- Cybercrime (12)
- Free speech (12)
- Liability (12)
- Websites (12)
- Facebook (11)
- Copyright (10)
- FTC (10)
- International law (10)
- Copyright law (9)
- Data (9)
- Digital Millennium Copyright Act (9)
- European Union (9)
- Security (9)
- Corporations (8)
- Publication Year
- Publication
-
- UIC John Marshall Journal of Information Technology & Privacy Law (150)
- Canadian Journal of Law and Technology (58)
- Richmond Journal of Law & Technology (44)
- Federal Communications Law Journal (35)
- Catholic University Journal of Law and Technology (32)
-
- Duke Law & Technology Review (27)
- Vanderbilt Journal of Entertainment & Technology Law (24)
- UIC Law Review (19)
- Michigan Telecommunications & Technology Law Review (17)
- SMU Science and Technology Law Review (16)
- Washington and Lee Law Review (16)
- Seattle University Law Review (15)
- BYU Law Review (14)
- Washington Journal of Law, Technology & Arts (14)
- Michigan Law Review (13)
- Maryland Law Review (12)
- Brooklyn Journal of International Law (10)
- Fordham Law Review (10)
- NYLS Law Review (10)
- Vanderbilt Journal of Transnational Law (10)
- American University Law Review (9)
- University of Michigan Journal of Law Reform (9)
- Indiana Law Journal (8)
- Pepperdine Law Review (8)
- University of Richmond Law Review (8)
- Brooklyn Journal of Corporate, Financial & Commercial Law (7)
- Journal of Law, Technology, & the Internet (7)
- Michigan Journal of International Law (7)
- Minnesota Journal of Law, Science & Technology (7)
- Pace Law Review (7)
Articles 1 - 30 of 942
Full-Text Articles in Entire DC Network
Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok
Conceptualizing An International Framework For Active Private Cyber Defence, Arindrajit Basu, Elonnai Hickok
Indian Journal of Law and Technology
Private sector cyber defence mechanisms are emerging despite existing legislation outlawing use of active defence by individuals and non-state entities. Thus, a key window exists for policy-makers in the possibility of establishing a framework for existing APCD practices that would enable optimal utilisation of private sector capabilities for securing cyber-space at an organizational and national level. This must happen in consonance with circumscribing their operations within the boundaries of the rule of law, both in terms of domestic legislation and international law. This paper seeks to unpack the complexities that underscore each of these challenges and identify avenues towards resolving …
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Genocide Studies and Prevention: An International Journal
Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).
The Legal Liabilities Of Twitch, Amazon’S Livestreaming Subsidiary, Jean Fang
The Legal Liabilities Of Twitch, Amazon’S Livestreaming Subsidiary, Jean Fang
The Journal of Business, Entrepreneurship & the Law
Amazon’s Twitch is the leader of the video game streaming market, controlling 76% of this market in the Americas and Europe. The video gaming market is rapidly expanding, exceeding its entertainment counterparts, including music and film, by wide margins in profits; experts valued the global gaming market at $229.39 billion in 2022 and expect it to grow to $401.32 billion by 2027. Amazon paid $1 billion to acquire Twitch in 2014 in a business move to capture the views of the gaming audience; on Twitch, popular streamers broadcast themselves playing video games to thousands of devoted fans. Based on recent …
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Everybody Wants To Rule The World: Central Bank Digital Currencies In The Era Of Decoupling The World’S Two Largest Economies, James M. Cooper
Washington Journal of Law, Technology & Arts
Some 130 central banks around the world are experimenting with various levels of a central bank digital currency (“CBDC”), a digitized form of a sovereign-backed, national currency that is a liability of that country’s central bank. Unlike fiat currency, CBDCs are trackable and potentially subject to interference and even freezing by government authorities. CBDCs will affect citizens’ control over commerce, payments, and savings, and impact their privacy rights. The Chinese government has piloted, refined, and rolled out its own CBDC called the Digital Currency/Electronic Payment initiative (“DC/EP”), also known as the digital yuan or e-CNY. The Chinese government is far …
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
Money Is Morphing - Cryptocurrency Can Morph To Be An Environmentally And Financially Sustainable Alternative To Traditional Banking, Clovia Hamilton
DePaul Business & Commercial Law Journal
No abstract provided.
Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod
Understanding Cyber Risk: Unpacking And Responding To Cyber Threats Facing The Public And Private Sectors, Lawrence J. Trautman, Scott Shackelford, Brian Elzweig, Peter Ormerod
University of Miami Law Review
Cyberattacks, data breaches, and ransomware continue to pose major threats to businesses, governments, and health and educational institutions worldwide. Ongoing successful instances of cybercrime involve sophisticated attacks from diverse sources such as organized crime syndicates, actors engaged in industrial espionage, nation-states, and even lone wolf actors having relatively few resources. Technological innovation continues to outpace the ability of U.S. law to keep pace, though other jurisdictions including the European Union have been more proactive. Nation-state and international criminal group ransomware attacks continue; Sony’s systems were hacked by a ransomware group; MGM Resorts disclosed that recovery from their September 2023 hack …
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Rembrandt’S Missing Piece: Ai Art And The Fallacies Of Copyright Law, Eleni Polymenopoulou
Washington Journal of Law, Technology & Arts
This article discusses contemporary problems related to Artificial Intelligence (AI), law and the visual arts. It suggests that the fallacies of copyright law are already visible in legal conundrums raised by AI in the creative sector. These include, for instance, the lack of uniformity in relation to creations’ copyrightability, the massive scale of copyright infringement affecting visual artists and the creative industry, and the difficulties in implementing media regulation and cyber-regulation. The deeply cherished ‘human authorship’ criterion that was sustained recently by a US Federal Appeals Court in Thaler, in particular, is a short-term solution to the legal challenges …
On The Genealogy Of Intimate Digital Harm, Aziz Z. Huq
On The Genealogy Of Intimate Digital Harm, Aziz Z. Huq
Michigan Law Review
A review of The Fight for Privacy: Protecting Dignity, Identity, and Love in the Digital Age. By Danielle Keats Citron.
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
The Lack Of Responsibility Of Higher Educaiton Institutions In Addressing Phishing Emails And Data Breaches, Muxuan (Muriel) Wang
Duke Law & Technology Review
Higher education institutions (HEIs) are highly susceptible to cyberattacks, particularly those facilitated through phishing, due to the substantial volume of confidential student and staff data and valuable research information they hold. Despite federal legislations focusing on bolstering cybersecurity for critical institutions handling medical and financial data, HEIs have not received similar attention. This Note examines the minimal obligations imposed on HEIs by existing federal and state statutes concerning data breaches, the absence of requirements for HEIs to educate employees and students about phishing attacks, and potential strategies to improve student protection against data breaches.
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
From Alpha To Omegle: A.M. V. Omegle And The Shift Towards Product Liability For Harm Incurred Online, Preston Buchanan
University of Miami Business Law Review
But for the Internet, many of our interactions with others would be impossible. From socializing to shopping, and, increasingly, working and attending class, the Internet greatly facilitates the ease of our daily lives. However, we frequently neglect to consider that our conduits to the Internet have the potential to lead to harm and injury. When the Internet was in its infancy, and primarily was a repository of information, Congress recognized the threat of continual lawsuits against online entities stemming from the content created by their users. The Communications Decency Act of 1996 arose to mitigate the seemingly Herculean task for …
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
Virtual Stardom: The Case For Protecting The Intellectual Property Rights Of Digital Celebrities As Software, Alexander Plansky
University of Miami Business Law Review
For the past several decades, technology has allowed us to create digital human beings that both resemble actual celebrities (living or deceased) or entirely virtual personalities from scratch. In the near future, this technology is expected to become even more advanced and widespread to the point where there may be entirely virtual celebrities who are just as popular as their flesh-and-blood counterparts—if not more so. This raises intellectual property questions of how these near-future digital actors and musicians should be classified, and who will receive the proceeds from their performances and appearances. Since, in the near-term, these entities will probably …
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Quantifying Civil Recovery In Hybrid Antitrust-Data Protection Harms, Jose Maria Marella
Washington Journal of Law, Technology & Arts
If digital platforms are found liable on hybrid antitrust-data protection violations, by how much should individual users be compensated? While traditional antitrust literature offers some estimation techniques, these methods were developed mostly around the idea that anti-competitive conduct manifests in supra-competitive prices, lost profits, or lost customers, all of which are easily quantifiable using commercially available evidence.
In digital markets, where antitrust violations are often intertwined with data protection issues, several complications arise. First, unlike transactions covered by traditional treble damage estimation techniques, “data-for-services” dealings are not evidenced by receipts. Second, personal data valuation is highly contextual and prone to …
Comparing Gdpr Against The United States’ Approach To Data Breach Notification By Examining Texas And California And The Feasibility Of A Universal Standard, Amrit Nagi
Cybaris®
No abstract provided.
Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray
Cyberflashing: Exposing Oklahoma’S Legal Loophole, Sara Wray
Oklahoma Law Review
No abstract provided.
The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers
The Future Of The Christchurch Call To Action: How To Build Multistakeholder Initiatives To Address Content Moderation Challenges, Rachel Wolbers
Journal of Law, Technology, & the Internet
This article explores the challenges the New Zealand Government faced after the events in Christchurch on 15 March 2019, where a violent gunman killed 51 people and live-streamed his attack on social media. The video was viewed millions of times in the days following, even as the tech companies took extraordinary efforts to reduce its virality. To find a long-term solution that ended the proliferation of this violent content while protecting human rights, the New Zealand Government decided to take a non-regulatory approach that worked alongside tech companies and civil society. The result was the creation of the Christchurch Call …
The Game-Changer: Legal Issues Surrounding Wearable Technology In Sports, Jack Vande Berg
The Game-Changer: Legal Issues Surrounding Wearable Technology In Sports, Jack Vande Berg
SMU Science and Technology Law Review
Athletes and teams are always seeking to gain a competitive edge, and the emergence of wearable technology has provided them with biometric data that provides new insights into performance. The market for wearable technology has been growing at a rapid pace in recent years and is projected to continue on an upward trajectory through the end of the decade. Governing bodies of sport at a professional and amateur level have adapted regulations for the use of this new technology and the data it produces. This article provides an overview of these current regulations, and then discusses three pressing legal issues. …
Virtual Justice: Criminalizing Avatar Sexual Assault In Metaverse Spaces, Olivia Bellini
Virtual Justice: Criminalizing Avatar Sexual Assault In Metaverse Spaces, Olivia Bellini
Mitchell Hamline Law Review
No abstract provided.
Real-World Consequences For Online Actions: The Case For Expanding Employee Harassment Protection Via Employers’ Rights Of Action, Alexander Barnes
Real-World Consequences For Online Actions: The Case For Expanding Employee Harassment Protection Via Employers’ Rights Of Action, Alexander Barnes
Seattle University Law Review
This Note argues for expanding employers’ access to legal remedies that allow them to recoup the costs of protecting their employees from swatting, doxing, and other online harassment arising from their employees’ professional activity. Part I provides a brief description and history of the online harassment problem and its potentially deadly dangers. Part II describes employers’ legal responsibility to take action to protect their employees from harassment aimed at their employees within the scope of their employment. Part III explores common legal remedies that are currently available to employers, using the state of Washington as an example. Part III also …
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
Byte A Carrot For Change: Uprooting Problems In Data Privacy Regulations, Sarah Terry
BYU Law Review
There is a growing gap between technology advancement and a lagging regulatory system. This is particularly problematic in consumer data privacy regulating. Companies hold collected consumer data and determine its use largely without accountability. As a result, ethical questions that carry society-shaping impact are answered in-house, under the influence of groupthink, and are withheld from anyone else weighing in.
This Note poses a solution that would address multiple data privacy regulation issues. Namely, an incentive approach would help even out the information-imbalanced system. Incentives are used as tools throughout intellectual property law to foster commercial progress, discourage trade secrets, and …
Section 230 As Civil Rights Statute, Enrique Armijo
Section 230 As Civil Rights Statute, Enrique Armijo
University of Cincinnati Law Review
Many of our most pressing discussions about justice, progress, and civil rights have moved online. Activists advocating for social change no longer need to be in the same physical space to connect with others who share their challenges and aspirations. But the convergence of mobility, connectivity, and technology is not the only reason why. Thanks to Section 230 of the Communications Decency Act’s (“Section 230”) immunity for online platforms, websites, and their hosts, speakers can engage in speech about protest, equality, and dissent without fear of collateral censorship from governments, authorities, and others in power who hope to silence them. …
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
The Present And Future Of Ai Usage In The Banking And Financial Decision-Making Processes Within The Developing Indian Economy, Dr. Shouvik Kumar Guha, Bash Savage-Mansary, Dr. Navyajyoti Samanta
Indian Journal of Law and Technology
In course of this paper, the authors have soght to examine the extent to which technology based on artificial intelligence (AI) have made inroads into the banking and financial sectors of a developing economy like India. The paper begins with providing a contextual background to the adoption of such technology in the global financial arena. It then proceeds to identify and categorise the forms of AI currently being used in the Indian financial sector and also considers the different channels of operation where such technology is in vogue. The advantages of using such technology and the future goals for integrating …
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
Caging The Bored Ape: How The Ftc's Expanded Anti-Monopoly Authority Can Tame "Nfts" For Web 3.0, J. Scott Colesanti
William & Mary Business Law Review
Non-Fungible Tokens, or “NFTs,” ballooned into a 40-billion-dollar industry in under a decade. Their creators include artists, corporations, entrepreneurs, fraudsters—and even Donald Trump. While NFT owners and traders could be any of us, the parties running the marketplaces are hidden. NFT regulators have yet to be identified. Most alarmingly, the dominant NFT marketplaces are dangerously centralized. Accordingly, the publicized tales of exorbitant or manipulated NFT prices and frequent related scams abound. Meanwhile cryptocurrency—the technology enabling the life of an NFT—remains beset with, at best, theoretical models for effective regulation a full generation after its emergence.
To propose a rational start …
Link Tank
DePaul Magazine
A new JD certificate program in information technology, cybersecurity and data privacy provides DePaul University students with proficiency in both law and tech.
Full Issue: Fall 2023
DePaul Magazine
In DePaul Magazine's fall 2023, President Robert L. Manuel unveils his Designing DePaul road map to position the university for monumental impact. We also highlight an innovative program that merges law and tech, an initiative centering humanities in collaborative, community-based interactions, and the ascendance of soprano Janai Brugger (SOM '05) on the international opera stage.
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim
Journal of Cybersecurity Education, Research and Practice
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …
Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly
Cryptocurrency Concerns, Crimes, And Legal Consequences, Madeline Connolly
Akron Law Review
This note addresses the current issues with the law and digital currencies, federal agencies’ current classifications of cryptocurrencies, problems with those classifications, and solutions to better regulate, classify, and prosecute virtual-currency crimes. The history of digital currencies, the history of criminal activity involving money, and how the creation and widespread use of cryptocurrencies has allowed criminals to find new ways to hide money that make it difficult for law enforcement to catch will be discussed. The article analyzes current and past cases involving different courts’ interpretations and prosecution of cryptocurrencies and concludes by offering solutions to the potential issues of …
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Ohio's Data Protection Act And/As A Process-Based Approach To "Reasonable" Security, Brian Ray
Akron Law Review
This essay argues that the ODPA [Ohio Data Protection Act], which has become a model for similar laws and legislative proposals in several other states, in effect creates a process-based standard for cybersecurity. It does so by incorporating the risk-based approach used by the listed cybersecurity frameworks as the defacto standard for reasonable security for organizations seeking to qualify for the Act’s affirmative defense. This article summarizes the ODPA and then explains the risk-based approach of the cybersecurity frameworks it incorporates. It then argues that this risk-based approach in effect establishes a process-based definition of reasonable security and explains why …
Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp
Instigator And Proxy Liability In The Context Of Information Operations, Carolyn Sharp
Brigham Young University Journal of Public Law
No abstract provided.
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Blockchain Safe Harbor? Applying The Lessons Learned From Early Internet Regulation, Amy Cyphert, Sam Perl
Marquette Law Review
It has been more than a quarter century since Congress enacted twin safe harbor provisions to help protect and encourage the growth of a nascent internet by removing some liability and regulatory uncertainty. Today, there are calls for a similar safe harbor provision for blockchain, the technology behind cryptocurrencies and smart contracts. What lessons have we learned from the implementation of the internet safe harbor provisions, Section 230 of the Communications Decency Act, and Section 512 of the Digital Millennium Copyright Act? This Article charts the history of those provisions and their judicial construction over the decades. It also examines …
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Towards A Strengthening Of Non-Interference, Sovereignty, And Human Rights From Foreign Cyber Meddling In Democratic Electoral Processes, Francesco Seatzu, Nicolás Carrillo-Santarelli
Brooklyn Journal of International Law
States have resorted to meddling in the elections of their counterparts throughout history. Recently, though, there has been an exponential increased in the use of the possibilities provided by technology. Attention to this phenomenon has deservedly grown quickly and exponentially. This has led to debates focusing on the adequacy of international legal rules and general principles to respond to foreign cyber election interference. In many of these debates some have expressed doubts and skepticism about the adequacy of current international law to confront foreign election interference through cyber means. There have also been disagreements about the applicable standards to fight …