Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 9 of 9
Full-Text Articles in Law
Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett
Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett
Oklahoma Journal of Law and Technology
No abstract provided.
Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio
Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio
Journal of Digital Forensics, Security and Law
Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do …
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Lori B. Andrews
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
Enhancing Cybersecurity In The Private Sector By Means Of Civil Liability Lawsuits - The Connie Francis Effect, Jeffrey F. Addicott
University of Richmond Law Review
The purpose of this article is to explore the threats posed by
cybersecurity breaches, outline the steps taken by the government
to address those threats in the private sector economy, and
call attention to the ultimate solution, which will most certainly
spur private businesses to create a more secure cyber environment
for the American people-a Connie Francis-styled cyber civil
action lawsuit.
Problems With Using Statistics To Justify Institutional Policies, Justin Shin
Problems With Using Statistics To Justify Institutional Policies, Justin Shin
Senior Projects Spring 2017
It is becoming increasingly common for institutions to use statistics to inform policy decisions. We should be prepared to ask ourselves what regulatory principles should be imposed on institutions that seek to justify certain policies through deference to a statistical analysis. This paper will examine the difficulties that come with using statistics to justify actions, and argue that certain standards of transparency and verifiability should be expected from any institution that seeks to involve a statistical analysis in the formation of policies. I will first use Market Share Liability, an established use of statistics, to draw out what responsibilities an …
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza
St. Mary's Law Journal
Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …
Fetishizing Copies, Jessica Litman
Fetishizing Copies, Jessica Litman
Book Chapters
Our copyright laws encourage authors to create new works and communicate them to the public, because we hope that people will read the books, listen to the music, see the art, watch the films, run the software, and build and inhabit the buildings. That is the way that copyright promotes the Progress of Science. Recently, that not-very-controversial principle has collided with copyright owners’ conviction that they should be able to control, or at least collect royalties from, all uses of their works. A particularly ill-considered manifestation of this conviction is what I have decided to call copy-fetish. This is the …
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …