Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Legislation

Selected Works

2015

Policy

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


The E-Books Conspiracy: Crossing The Line Between Applying And Creating Law, Tom Campbell Dec 2014

The E-Books Conspiracy: Crossing The Line Between Applying And Creating Law, Tom Campbell

Tom Campbell

This article responds to John Kirkwood’s Collusion to Control a Powerful Customer: Amazon, E-Books, and Antitrust Policy. Professor Kirkwood argued that in a monopsonistic market (i.e., one where there exists one powerful buyer and many less powerful sellers), or a market in which a buyer has significantly more power than the sellers, collusion on the part of the sellers might be justified, and ought to be a defense to antitrust claims, under certain conditions. This article summarizes Kirkwood’s proposed requirements for invoking this defense and argues that they are overly prescriptive, failing to allow certain instances of beneficial collusion, imposing …