Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Law

Beyond The Corporate Responsibility To Respect Human Rights In The Dawn Of A Metaverse, Kuzi Charamba Dec 2022

Beyond The Corporate Responsibility To Respect Human Rights In The Dawn Of A Metaverse, Kuzi Charamba

University of Miami International and Comparative Law Review

Technological advances in the 21st century pose new threats to human rights from business activities. In this new technological age, individuals and communities engage through an increasing myriad of digital means and platforms, all facilitated by a smaller, more powerful set of global BigTech companies, such as Microsoft, Apple, Google, and Meta (formerly known as Facebook). In so doing, however, our lives as workers, consumers, and citizens become subject to increasing corporate control through surveillance capitalism and algorithmic governance. With the dawn of metaverses—3D immersive digital environments in which you can interact with others via avatars and through virtual and …


Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang Jan 2022

Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang

Articles

This Article contributes to our understanding of the current state of cyber law. The global perspective demonstrates an almost uniform response to the U.S. law in cyberspace from all of America's major trading partners. In the past, comparative studies tended to focus on a single jurisdiction-typically, the European Union-and compared it with the United States. This approach, informative as it was, significantly understated the gravity of the differences between that jurisdiction and the United States. Fundamentally, it was based on an American-centric outlook with primary interests in building convergence models. In cyberspace, however, this is simply not helpful. In recent …


Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman Dec 2021

Securing The Precipitous Heights: U.S. Lawfare As A Means To Confront China At Sea, In Space, And Cyberspace, Garret S. Bowman

Pace International Law Review

No abstract provided.


Attribution And Other Conditions Of Lawful Countermeasures To Cyber Misconduct, Mary Ellen O'Connell Jan 2020

Attribution And Other Conditions Of Lawful Countermeasures To Cyber Misconduct, Mary Ellen O'Connell

Notre Dame Journal of International & Comparative Law

State cyber misconduct is on the rise, and it can be difficult to differentiate between malicious governmental cyber conduct and active cyber defense. Though some argue that cyberspace is a law-free zone, offensive cyberattacks are almost always unlawful regardless of their purpose. This Article contends that international law can provide for legal boundaries in cyberspace and analogizes cyber misconduct to government actions such as espionage. So long as conditions provided by international law (such as notice, necessity, and proportionality) are met, countermeasures to malicious cyber operations are generally lawful. Cases of urgency may be an exception to this general rule …


Collective Countermeasures In Cyberspace, Jeff Kosseff Jan 2020

Collective Countermeasures In Cyberspace, Jeff Kosseff

Notre Dame Journal of International & Comparative Law

The president of Estonia, Kersti Kaljulaid, has supported the use of collective countermeasures in response to cyberspace crimes. Collective countermeasures would allow an uninjured state to provide guidance or carry out countermeasures on behalf of another state. This Article advocates for collective countermeasures in cyberspace so long as the operations are carefully executed and subject to the same restrictions as individual countermeasures. This Article further finds for the following in favor of limited forms of collective countermeasures: (1) the highly interconnected nature of threats in cyberspace; (2) states with more sophisticated cyber capabilities can leverage for comparative advantages; (3) states …


An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty Jan 2020

An Extraterritorial Human Right To Cybersecurity, Ido Kilovaty

Notre Dame Journal of International & Comparative Law

Cybersecurity breaches have affected consumers and the landscape of politics globally. Legal developments have been reactive and incomprehensive. The fatal flaws of international law make it an ill-suited solution to these concerns because international law binds state actors and does not give individuals rights. International human rights law, however, provides the best solution because it does provide harmed individuals with rights and mechanisms to seek recourse. Cybersecurity relates to several key areas of human rights law and, therefore, its regulation is well suited to the existing international human rights regulatory scheme. This Article explores the possibility of using international human …


Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood Jan 2020

Domestic Law Responses To Transnational Cyberattacks And Other Online Harms: Internet Dreams Turned To Internet Nightmares And Back Again, Clive Walker, Ummi Hani Binti Masood

Notre Dame Journal of International & Comparative Law

Since its utilization has become widespread, the potential of the Internet has often been overshadowed by the harms it’s capable of bringing upon society. Regulation has not yet properly addressed the harms presented to individuals’ cybersecurity and the U.K. has focused and set objectives at a national security level, while ignoring the effects of attacks on individual citizens. This Article considers whether it is possible to create a domestic legal response to transnational cyberattacks and the appropriateness of law to address the threats, as they exist. The law must be efficient, effective, and fair, which are all aims it may …


Neutrality In The Modern World: Internet Regulation's Impact On Economics And Society, Sarah Deagostino Jan 2020

Neutrality In The Modern World: Internet Regulation's Impact On Economics And Society, Sarah Deagostino

Notre Dame Journal of International & Comparative Law

In the United States, net neutrality laws prevented service providers from restricting open access to the Internet. In 2017, these laws were repealed and consumers became concerned that Internet providers would take advantage of them through blocking, throttling, and paid prioritization. The trend in the United States, from the rise of the telephone and wire transfer to the rise of the Internet, was toward facilitating access to the Internet for all citizens. This is intended to result in economic advantages for the country, and aid in the development of broadband Internet. Open access to the Internet was regarded as providing …


Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds Dec 2008

Electronic Contracting Cases 2008-2009, Juliet M. Moringiello, William L. Reynolds

William L. Reynolds

In this survey, we review electronic contracting cases decided between June 15, 2008 and June 15, 2009. During that period we found that there was not much action on the formation by click-wrap and browse-wrap front. We have previously observed that the law of electronic contracts has matured, and the fact that there have not been any decisions on whether click-wrap and browse-wrap are effective ways of forming contracts reflects that observation. This year brought us three modification cases, two cases in which a party alleged that it was not bound to the offered terms because an unauthorized party agreed …