Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

PDF

Journal

2021

Institution
Keyword
Publication

Articles 1 - 30 of 87

Full-Text Articles in Law

Establishing A Legitimate Indonesia’S Government Electronic Surveillance Regulation: A Comparison With The U.S. Legal Practices, Citra Yuda Nur Fatihah Dec 2021

Establishing A Legitimate Indonesia’S Government Electronic Surveillance Regulation: A Comparison With The U.S. Legal Practices, Citra Yuda Nur Fatihah

Indonesia Law Review

Cybersecurity and privacy have now become a matter of increasing concern for citizens, the private sector, and the Indonesian government. The government is currently struggling to combat cyberattacks and data breaches. Indonesia is, in fact, in the early stages of developing a national cybersecurity strategy. The legal framework for cybersecurity in Indonesia is still weak. The one and only legal basis for regulating cybersecurity, privacy, and security, in Indonesia so far is the Electronic Information and Transactions Law No. 11/2008 and its revised version Law No.19/2016. Furthermore, the government through the Indonesian Ministry of Communication and Information has just issued …


Stifling Dissent Or Enforcing Rules? The State Of Speech Rights In Online Forums, Noah Olson Dec 2021

Stifling Dissent Or Enforcing Rules? The State Of Speech Rights In Online Forums, Noah Olson

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


“Storytime: We’Re Being Sued” – Copyright Infringement And Fair Use In The Digital Era, Mikayla Spencer Dec 2021

“Storytime: We’Re Being Sued” – Copyright Infringement And Fair Use In The Digital Era, Mikayla Spencer

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


The Importance Of Being Earnestly Innovative: The Increasing Role Of Intellectual Property Law In The Global Economy, Inma Sumaita Dec 2021

The Importance Of Being Earnestly Innovative: The Increasing Role Of Intellectual Property Law In The Global Economy, Inma Sumaita

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Intellectual Property & National Security, James Morrison Dec 2021

Intellectual Property & National Security, James Morrison

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


The Patentability Of Antibodies For Use In Medications After Amgen V. Sanofi, Kaitlyn Taylor Dec 2021

The Patentability Of Antibodies For Use In Medications After Amgen V. Sanofi, Kaitlyn Taylor

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Copyright Claims And Constitutional Games: The Constitutionality Of The Copyright Claims Board Following The Supreme Court Ruling In Arthrex, Laura Callihan Dec 2021

Copyright Claims And Constitutional Games: The Constitutionality Of The Copyright Claims Board Following The Supreme Court Ruling In Arthrex, Laura Callihan

The University of Cincinnati Intellectual Property and Computer Law Journal

No abstract provided.


Performance Assessment Of Some Phishing Predictive Models Based On Minimal Feature Corpus, Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B Mr. Dec 2021

Performance Assessment Of Some Phishing Predictive Models Based On Minimal Feature Corpus, Orunsolu Abdul Abiodun, Sodiya A.S, Kareem S.O, Oladimeji G. B Mr.

Journal of Digital Forensics, Security and Law

Phishing is currently one of the severest cybersecurity challenges facing the emerging online community. With damages running into millions of dollars in financial and brand losses, the sad tale of phishing activities continues unabated. This led to an arms race between the con artists and online security community which demand a constant investigation to win the cyberwar. In this paper, a new approach to phishing is investigated based on the concept of minimal feature set on some selected remarkable machine learning algorithms. The goal of this is to select and determine the most efficient machine learning methodology without undue high …


From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi Dec 2021

From The Golden Gate To London: Bridging The Gap Between Data Privacy And The Right Of Publicity, Kristin Kuraishi

Brooklyn Journal of International Law

Currently, there is no global standard or recognition for the right of publicity. Even within the United States, the recognition, scope, and protections vary by state. As the world becomes increasingly reliant on social media for news, information, communication, and recommendations, micro-influencers and non-celebrities require a way to control their developed and curated name, image, and likeness from unauthorized commercial uses by others. Advertising is occurring more frequently online, and brands recognize the power that micro-influencers have on commerce. Some countries, like the United Kingdom, do not recognize the right of publicity, potentially leaving many individuals without recourse for the …


Uncertain Terms, Leah R. Fowler, Jim Hawkins, Jessica L. Roberts Dec 2021

Uncertain Terms, Leah R. Fowler, Jim Hawkins, Jessica L. Roberts

Notre Dame Law Review

Health apps collect massive amounts of sensitive consumer data, including information about users’ reproductive lives, mental health, and genetics. As a result, consumers in this industry may shop for privacy terms when they select a product. Yet our research reveals that many digital health tech companies reserve the right to unilaterally amend their terms of service and their privacy policies. This ability to make one-sided changes undermines the market for privacy, leaving users vulnerable. Unfortunately, the current law generally tolerates unilateral amendments, despite fairness and efficiency concerns. We therefore propose legislative, regulatory, and judicial solutions to better protect consumers of …


Ai In Adjudication And Administration, Cary Coglianese, Lavi M. Ben-Dor Dec 2021

Ai In Adjudication And Administration, Cary Coglianese, Lavi M. Ben-Dor

Brooklyn Law Review

The use of artificial intelligence has expanded rapidly in recent years across many aspects of the economy. For federal, state, and local governments in the United States, interest in artificial intelligence has manifested in the use of a series of digital tools, including the occasional deployment of machine learning, to aid in the performance of a variety of governmental functions. In this Article, we canvass the current uses of such digital tools and machine-learning technologies by the judiciary and administrative agencies in the United States. Although we have yet to see fully automated decision-making find its way into either adjudication …


Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane Dec 2021

Digital Privacy Rights And Cloud Act Agreements, Tim Cochrane

Brooklyn Journal of International Law

The United States (US) and United Kingdom (UK) will soon bring into force a new international law enforcement data sharing ‘CLOUD Act agreement’ (US-UK Agreement), the first of its kind under the Clarifying Lawful Overseas Use of Data Act 2018 (CLOUD Act). These agreements enable law enforcement in one state to directly request data from service providers based in the other state. They respond to long-standing concerns with the main mechanism for obtaining overseas data, mutual legal assistance (MLA). The US and UK claim the US-UK Agreement will significantly speed up data access relative to MLA while “respecting privacy and …


Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker Dec 2021

Prosecuting The Phone Scammer When Extradition Fails And Concurrent Jurisdiction Exists, Michelle Lepkofker

Brooklyn Journal of International Law

Advancements in technology allow people to place phone calls half a world away via the internet. This technology has made it easier and cheaper for consumers to communicate, but it has also made it easier for scammers to reach more unsuspecting victims. In 2020, TrueCaller, an app designed to block scam phone calls, successfully blocked, and identified 31.3 billion spam calls in 20 countries. In the same year, Americans alone lost a total of USD $ 29.8 billion to scam calls. This Note argues that phone scams continue to be lucrative, in part, because criminal prosecutions of transnational crimes are …


Cracking The Code: How To Prevent Copyright Termination From Upending The Proprietary And Open Source Software Markets, Grant Emrich Dec 2021

Cracking The Code: How To Prevent Copyright Termination From Upending The Proprietary And Open Source Software Markets, Grant Emrich

Fordham Law Review

Computer software is protected by copyright law through its underlying code, which courts have interpreted as constituting a “literary work” pursuant to the Copyright Act. Prior to including software as copyrightable subject matter, Congress established a termination right which grants original authors the ability to reclaim their copyright thirty-five years after they have transferred it. Termination was intended to benefit up-and-coming authors who faced an inherent disadvantage in the market when selling the rights to their works. In the near future, many software works will reach the thirty-five-year threshold, thus presenting courts with a novel application of termination to computer …


The Technologization Of Insurance: An Empirical Analysis Of Big Data And Artificial Intelligence’S Impact On Cybersecurity And Privacy, Shauhin A. Talesh, Bryan Cunningham Dec 2021

The Technologization Of Insurance: An Empirical Analysis Of Big Data And Artificial Intelligence’S Impact On Cybersecurity And Privacy, Shauhin A. Talesh, Bryan Cunningham

Utah Law Review

This Article engages one of the biggest issues debated among privacy and technology scholars by offering an empirical examination of how big data and emerging technologies influence society. Although scholars explore the ways that code, technology, and information regulate society, existing research primarily focuses on the theoretical and normative challenges of big data and emerging technologies. To our knowledge, there has been very little empirical analysis of precisely how big data and technology influence society. This is not due to a lack of interest but rather a lack of disclosure by data providers and corporations that collect and use these …


Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara Nov 2021

Don't Bite The Bait: Phishing Attack For Internet Banking (E-Banking), Ilker Kara

Journal of Digital Forensics, Security and Law

Phishing attacks are based on obtaining desired information from users quickly and easily with the help of misdirecting, panicking, curiosity, or excitement. Most of the phishing web sites are designed on internet banking(e-banking) and the attackers can acquire financial information of misled users with the tactics and discourses they develop. Despite the increase of prevention techniques against phishing attacks day by day, an effective solution could not be found for this issue due to the human factor. Because of this reason, real phishing attack studies are essential to study and analyze the attackers’ attack techniques and strategies. This study focused …


Cacophony Or Concerto?: Analyzing The Applicability Of The Wiretap Act’S Party Exception For Duplicate Get Requests, David Koenig Nov 2021

Cacophony Or Concerto?: Analyzing The Applicability Of The Wiretap Act’S Party Exception For Duplicate Get Requests, David Koenig

Fordham Law Review

The Electronic Communications Privacy Act (“Wiretap Act”) prohibits the intentional interception of an electronic communication. However, “parties to a communication” can intercept a communication without Wiretap Act liability. Parties include the intended recipients of a communication. When internet users navigate the internet, they communicate with websites using GET requests. The users’ GET requests call out to websites and websites respond by providing the websites’ content to the users. During this process, websites receive user data. This data can include information about the website visited, the search terms used to locate the website, and referral data identifying the last web page …


The Ratio Method: Addressing Complex Tort Liability In The Fourth Industrial Revolution, Harrison C. Margolin, Grant H. Frazier Oct 2021

The Ratio Method: Addressing Complex Tort Liability In The Fourth Industrial Revolution, Harrison C. Margolin, Grant H. Frazier

St. Mary's Law Journal

Emerging technologies of the Fourth Industrial Revolution show fundamental promise for improving productivity and quality of life, though their misuse may also cause significant social disruption. For example, while artificial intelligence will be used to accelerate society’s processes, it may also displace millions of workers and arm cybercriminals with increasingly powerful hacking capabilities. Similarly, human gene editing shows promise for curing numerous diseases, but also raises significant concerns about adverse health consequences related to the corruption of human and pathogenic genomes.

In most instances, only specialists understand the growing intricacies of these novel technologies. As the complexity and speed of …


Market Power And Switching Costs: An Empirical Study Of Online Networking Market, Shin-Ru Cheng Oct 2021

Market Power And Switching Costs: An Empirical Study Of Online Networking Market, Shin-Ru Cheng

University of Cincinnati Law Review

In recent years, states have launched several antitrust investigations targeting digital platforms. A major difficulty in these investigations is demonstrating the extent of a digital platform’s market power. Market power is defined as the control of the output or the price without the loss of business to competitors. As will be explored in this Article, market power is a critical component in an antitrust analysis. On several occasions, courts have adopted the switching costs approach in their analysis of market power. According to this approach, market power may be inferred when the costs of switching from one supplier to another …


In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller Oct 2021

In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller

International Law Studies

States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …


Copyrighting Tiktok Dances: Choreography In The Internet Age, Ali Johnson Oct 2021

Copyrighting Tiktok Dances: Choreography In The Internet Age, Ali Johnson

Washington Law Review

TikTok is a video-sharing social media application that launched in 2018 and has grown wildly since its inception. Many users are drawn to the platform by “dance challenges”—short dance routines of varying complexity set to popular songs that are recreated by other users, eventually going “viral” (i.e., recreated on a massive scale by other users) on the app. Going viral can provide young dancers and choreographers an opportunity to break into the highly competitive entertainment industry. However, there is a problem: due to TikTok’s interface and community practices, the original creators of a dance (who, significantly, are often young women …


Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee Sep 2021

Internet Of Things Software And Hardware Architectures And Their Impacts On Forensic Investigations: Current Approaches And Challenges, Abel Alex Boozer, Arun John, Tathagata Mukherjee

Journal of Digital Forensics, Security and Law

The never-before-seen proliferation of interconnected low-power computing devices, patently dubbed the Internet of Things (IoT), is revolutionizing how people, organizations, and malicious actors interact with one another and the Internet. Many of these devices collect data in different forms, be it audio, location data, or user commands. In civil or criminal nature investigations, the data collected can act as evidence for the prosecution or the defense. This data can also be used as a component of cybersecurity efforts. When data is extracted from these devices, investigators are expected to do so using proven methods. Still, unfortunately, given the heterogeneity in …


The Survey On Cross-Border Collection Of Digital Evidence By Representatives From Polish Prosecutors’ Offices And Judicial Authorities, Paweł Olber Dr Sep 2021

The Survey On Cross-Border Collection Of Digital Evidence By Representatives From Polish Prosecutors’ Offices And Judicial Authorities, Paweł Olber Dr

Journal of Digital Forensics, Security and Law

Dynamic development of IT technology poses new challenges related to the cross-border collection of electronic evidence from the cloud. Many times investigators need to secure data stored on foreign servers directly and then look for solutions on how to turn the data into a legitimate source of evidence. To study the situation and propose solutions, I conducted a survey among Polish representatives of public prosecutors' offices and courts. This paper presents information from digital evidence collection practices across multiple jurisdictions. I stated that representatives from the prosecution and the judiciary in Poland are aware of the issues associated with cross-border …


Risky Fine Print: A Novel Typology Of Ethical Risks In Mobile App User Agreements, Bar Fargon Mizrahi Sep 2021

Risky Fine Print: A Novel Typology Of Ethical Risks In Mobile App User Agreements, Bar Fargon Mizrahi

Villanova Law Review

No abstract provided.


Shenanigans (Internet Takedown Edition), Eugene Volokh Aug 2021

Shenanigans (Internet Takedown Edition), Eugene Volokh

Utah Law Review

Protecting one’s own reputation and livelihood—whether protecting it against lies, against opinions, or against the truth—is likely high on many people’s willing-to-lie-for lists. Making money is, too. Yet though I don’t think of myself as naïve on this score, the sheer magnitude and brazenness of these schemes surprised me. My sense is that it surprised many of my colleagues. Perhaps it surprised you. And this reminder of just how common fraud can be might help keep us alert to shenanigans in many other fields as well— and might help us design systems that deal better with such risks.


Information Privacy In An Age Of Invisible Shopper Tracking: Who Will Pay The Price For Stores Of The Future?, Kristin Harripaul Aug 2021

Information Privacy In An Age Of Invisible Shopper Tracking: Who Will Pay The Price For Stores Of The Future?, Kristin Harripaul

Georgia State University Law Review

Explosive growth in technology has brought a unique opportunity to the doors of brick-and-mortar retail—a nearly $3.38 trillion industry struggling to regain relevance among modern, digitally enabled shoppers. Specifically, in-store analytics, or shopper tracking technologies, are allowing these retailers to better compete with online stores by tapping into consumer data unprecedented in the brick-and-mortar context. With these technologies, stores now have access to detailed metrics, like consumer dwell times, journeys, product engagement, product views, and demographic data such as age and gender, which can be used to optimize store operations and marketing and promotions.

Recent events, however, including a string …


An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle Jul 2021

An Economical Method For Securely Disintegrating Solid-State Drives Using Blenders, Brandon J. Hopkins Phd, Kevin A. Riggle

Journal of Digital Forensics, Security and Law

Pulverizing solid-state drives (SSDs) down to particles no larger than 2 mm is required by the United States National Security Agency (NSA) to ensure the highest level of data security, but commercial disintegrators that achieve this standard are large, heavy, costly, and often difficult to access globally. Here, we present a portable, inexpensive, and accessible method of pulverizing SSDs using a household blender and other readily available materials. We verify this approach by pulverizing SSDs with a variety of household blenders for fixed periods of time and sieve the resulting powder to ensure appropriate particle size. Among the 6 household …


Article Iii Standing, The Sword And The Shield: Resolving A Circuit Split In Favor Of Data Breach Plaintiffs, R. Andrew Grindstaff Jun 2021

Article Iii Standing, The Sword And The Shield: Resolving A Circuit Split In Favor Of Data Breach Plaintiffs, R. Andrew Grindstaff

William & Mary Bill of Rights Journal

The recent proliferation of data breaches is one such event requiring a rethreading of standing doctrine. The Courts of Appeal are currently split on whether to allow or deny standing for data breach plaintiffs—those persons seeking recourse from the entities that fell victim to the breach and therein lost plaintiffs’ data to an unknown third party. Standing requires plaintiffs to show some injury, and how courts approach the concept of injury in these data breach cases determines whether plaintiffs will survive the standing analysis. Despite the disparate treatment of litigants across the circuits, the Supreme Court has repeatedly punted when …


Outsourcing Privacy, Ari Ezra Waldman May 2021

Outsourcing Privacy, Ari Ezra Waldman

Notre Dame Law Review Reflection

An underappreciated part of the narrative of privacy managerialism—and the focus of this Essay—is the information industry’s increasing tendency to outsource privacy compliance responsibilities to technology vendors. In the last three years alone, the International Association of Privacy Professionals (IAPP) has identified more than 250 companies in the privacy technology vendor market. These companies market their products as tools to help companies comply with new privacy laws like the General Data Protection Regulation (GDPR), with consent orders from the Federal Trade Commission (FTC), and with other privacy rules from around the world. They do so by building compliance templates, pre-completed …


Introduction, Mark P. Mckenna May 2021

Introduction, Mark P. Mckenna

Notre Dame Law Review Reflection

Julie Cohen’s Between Truth and Power is, as Orly Lobel writes, a “dazzling tour de force” that “asks us to consider the new ways powerful actors extract valuable resources for gain and dominance.” As she has done so frequently, Cohen takes an incredibly complex story and weaves together a comprehensive narrative that changes the entire framing of legal questions. Agree or disagree with her diagnoses, no one who seriously engages this book will ever think about regulation in the information economy the same way.

In January 2020 (seemingly a lifetime ago, given what 2020 would bring), we gathered leading thinkers …