Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Re-Imagining The Post-9/11 Authorizations For Use Of Military Force In The Era Of Emerging Consensus On Reform, Peter J. Amato Jan 2024

Re-Imagining The Post-9/11 Authorizations For Use Of Military Force In The Era Of Emerging Consensus On Reform, Peter J. Amato

Journal of Legislation

No abstract provided.


Propaganda By Permission: Examining "Political Activities" Under The Foreign Agents Registration Act, Tarun Krishnakumar May 2021

Propaganda By Permission: Examining "Political Activities" Under The Foreign Agents Registration Act, Tarun Krishnakumar

Journal of Legislation

No abstract provided.


Cyber-Security, Privacy, And The Covid-19 Attenuation?, Vincent J. Samar Jan 2021

Cyber-Security, Privacy, And The Covid-19 Attenuation?, Vincent J. Samar

Journal of Legislation

Large-scale data brokers collect massive amounts of highly personal consumer information to be sold to whoever will pay their price, even at the expense of sacrificing individual privacy and autonomy in the process. In this Article, I will show how a proper understanding and justification for a right to privacy, in context to both protecting private acts and safeguarding information and states of affairs for the performance of such acts, provides a necessary background framework for imposing legal restrictions on such collections. This problem, which has already gained some attention in literature, now becomes even more worrisome, as government itself …


The Perils And Promises Of Artificial General Intelligence, Brian S. Haney Jun 2019

The Perils And Promises Of Artificial General Intelligence, Brian S. Haney

Journal of Legislation

No abstract provided.


Two Steps Forward, One Step Back: The Defend Trade Secrets Act Of 2016 And Why The Computer Fraud And Abuse Act Of 1984 Still Matters For Trade Secret Misappropriation, Patrick J. Manion Apr 2017

Two Steps Forward, One Step Back: The Defend Trade Secrets Act Of 2016 And Why The Computer Fraud And Abuse Act Of 1984 Still Matters For Trade Secret Misappropriation, Patrick J. Manion

Journal of Legislation

No abstract provided.


Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood Dec 2016

Solving The Information Security & Privacy Crisis By Expanding The Scope Of Top Management Personal Liability, Charles Cresson Wood

Journal of Legislation

While information security and privacy losses are now spiraling out of control, and have been demonstrably shown to threaten national sovereignty, military superiority, industrial infrastructure order, national economic competitiveness, the solvency of major businesses, faith and trust in the Internet as a platform for modern commerce, as well as political stability, the U.S. Congress has nonetheless to date refused to seriously address the root cause of these threats. The root cause is a legally reinforced incentive system that encourages, and further entrenches, top management decisions that provide inadequate resources for, and inadequate top management attention to, information security and privacy …


Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King Jul 2015

Remembering The Lessons Of 9/11: Preserving Tools And Authorities In The Fight Against Terrorism, Congressman Peter T. King

Journal of Legislation

As Chairman of the Subcommittee on Counterterrorism and Intelligence, a Member of the House Permanent Select Committee on Intelligence, and a Con- gressman from New York, 9/11 was a very personal experience that continues to resonate with me. I lost over 150 neighbors, friends and constituents on September 11th, but no one has a monopoly on grief. This issue went to the soul of the entire country, and touches our lives nearly 15 years later. That day forces us to acknowledge, whether some of us want to or not, that we have an unyielding enemy, vicious and bitter, that will …


Tyrant's Toolbox: Technology And Privacy In America;Legislative Reform Commentary, Bob Barr Feb 2015

Tyrant's Toolbox: Technology And Privacy In America;Legislative Reform Commentary, Bob Barr

Journal of Legislation

No abstract provided.


Least Restrictive Means: A Clear Path For User-Based Regulation Of Minors' Access To Indecent Material On The Internet;Legislative Reform, Anthony Niccoli Feb 2015

Least Restrictive Means: A Clear Path For User-Based Regulation Of Minors' Access To Indecent Material On The Internet;Legislative Reform, Anthony Niccoli

Journal of Legislation

No abstract provided.


Great Wildcard: How 2011 Shook The Online Poker World And Became A Game-Changer In The Battle For Legalization, The;Note, Kerry O'Brien May 2012

Great Wildcard: How 2011 Shook The Online Poker World And Became A Game-Changer In The Battle For Legalization, The;Note, Kerry O'Brien

Journal of Legislation

No abstract provided.


Riding The Wave: The Uncertain Future On Rfid Legislation;Note, Kyle Sommer Jan 2009

Riding The Wave: The Uncertain Future On Rfid Legislation;Note, Kyle Sommer

Journal of Legislation

No abstract provided.


Re-Defining National Security In The Technology Age: The Encryption Export Debate;Note, Mark T. Pasko May 2000

Re-Defining National Security In The Technology Age: The Encryption Export Debate;Note, Mark T. Pasko

Journal of Legislation

No abstract provided.