Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 9 of 9
Full-Text Articles in Law
Metaphors Of International Law, Harlan G. Cohen
Metaphors Of International Law, Harlan G. Cohen
Scholarly Works
This chapter explores international law in search of its hidden and not-so-hidden metaphors. In so doing, it discovers a world inhabited by states, where rules are mined or picked when ripe, where trade keeps boats forever afloat on rising tides. But is also unveils a world in which voices are silenced, inequality is ignored, and hands are washed of responsibility.
International law is built on metaphors. Metaphors provide a language to describe and convey the law’s operation, help international lawyers identify legal subjects and categorize situations in doctrinal categories, and provide normative justifications for the law. Exploring their operation at …
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
Library Philosophy and Practice (e-journal)
Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
Law Faculty Publications
States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.
This Article draws on tort law and international law principles to construct …
Sovereignty In The Age Of Cyber, Gary Corn
Sovereignty In The Age Of Cyber, Gary Corn
Articles in Law Reviews & Other Academic Journals
International law is a foundational pillar of the modern international order, and its applicability to both state and nonstate cyber activities is, by now, beyond question. However, owing to the unique and rapidly evolving nature of cyberspace, its ubiquitous interconnectivity, its lack of segregation between the private and public sectors, and its incompatibility with traditional concepts of geography, there are difficult and unresolved questions about exactly how international law applies to this domain. Chief among these is the question of the exact role that the principle of sovereignty plays in regulating states' cyber activities.
Who Runs The Internet?, Anupam Chander
Who Runs The Internet?, Anupam Chander
Georgetown Law Faculty Publications and Other Works
There is no single answer to the question of who runs the Internet. Is it the United States, often seen as the hegemon of the Internet, home to so many of the world’s leading Internet enterprises? Is it China, which erects a “Great Firewall” to assert control over the portion of the Internet available in China? Is it the European Union, which extends its power globally through its data protection regime, designating countries as “adequate” or (implicitly) “inadequate” to receive its data? Is it ICANN, the California not-for-profit organization that controls how Internet addresses are allocated? Is it the World …
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
Scholarly Works
Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Publications
No abstract provided.