Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- National Security (2)
- Bitcoin (1)
- Botnets (1)
- Constitutional law (1)
- Copyright Infringement (1)
-
- Criminal prosecution (1)
- Cyber-Social Systems (1)
- Cyberattacks (1)
- Cybercrimes (1)
- Cybersecurity (1)
- Cyberterrorism (1)
- Democracy (1)
- Digital Service Providers (1)
- Digital Technology (1)
- Dodd-Frank Act (1)
- E-Commerce (1)
- Economic Growth (1)
- Edward Snowden (1)
- Espionage Act (1)
- File Sharing (1)
- Financial Technology (1)
- First amendment (1)
- Income Tax (1)
- Information Systems (1)
- Journalism (1)
- Journalists (1)
- Malware (1)
- Media organizations (1)
- NSA (1)
- National Security Agency (1)
Articles 1 - 4 of 4
Full-Text Articles in Law
The Resilient Foundation Of Democracy: The Legal Deconstruction Of The Washington Posts's Condemnation Of Edward Snowden, Hanna Kim
Indiana Law Journal
On September 17, 2016, The Washington Post (“the Post”) made history by being the first paper to ever call for the criminal prosecution of its own source —Edward Snowden. Yet, two years prior to this editorial, the Post accepted the 2014 Pulitzer Prize in Public Service for its “revelation of widespread secret surveillance by the National Security Agency”—an honor which would not have been bestowed had Snowden not leaked the documents through this news outlet. The other three major media outlets that received and published Snowden’s documents and findings—The Guardian, The New York Times, and The Intercept—all have taken the …
Cybersecurity And Tax Reform, Michael Hatfield
Cybersecurity And Tax Reform, Michael Hatfield
Indiana Law Journal
INTRODUCTION
I. THE PAST AND FUTURE OF THE IRS AS A CYBERATTACK TARGET
A. IRS AS A CYBERATTACK TARGET
B. THE FUTURE OF THE IRS AS A CYBERATTACK TARGET1. INFORMATION TECHNOLOGY
2. TAX INFORMATION
3. TYPES OF FUTURE ATTACKS
II. THE IRSWILL FAIL TO IMPLEMENT ADEQUATE CYBERSECURITY
A. VERY POOR HISTORY OF IMPROVING TECHNOLOGY
B. INADEQUATE FUNDING
C. INABILITY TO RECRUIT AND RETAIN EXPERTS
D. TOOMANY USERS
E. CYBERSECURITY IS DIFFICULT
III. BETTER DIGITAL TECHNOLOGY IS NOT THE GOAL
A. SLOWING THE USE OF DIGITAL TECHNOLOGY
B. CYBERSECURITY AND TAX REFORM
1. PAY-AS-YOU-EARN (PAYE)
2. SIMPLIFIED INCOME TAX
3. PURIFIED …
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Too-Big-To-Fail 2.0? Digital Service Providers, Nizan Geslevich Packin
Indiana Law Journal
The Article explains why addressing Too-Big-To-Fail 2.0 has not yet become a political and societal priority. First, digital service providers are technology companies, which, many believe, are shaped by market forces such that they fail and succeed in equal measure without producing negative ripple effects on the economy or society. Second, technology giants are not as carefully regulated as banks becauseunlike banks, they do not take insured deposits backed by the government. Third, even heavily regulated financial institutions have not been required until recently to focus on cybersecurity. Finally, some believe that there is no point in worrying about Too-Big-To-Fail …
Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia
Typhoid Mario: Video Game Piracy As Viral Vector And National Security Threat, Andrew V. Moshirnia
Indiana Law Journal
Current academic and policy discussions regarding video game piracy focus on the economic losses inherent to copyright infringement. Unfortunately, this approach neglects the most significant implication of video game piracy: malware distribution. Copyright-motivated efforts to shut down file-sharing sites do little to reduce piracy and actually increase viral malware infection. Pirated video games are an ideal delivery device for malware, as users routinely launch unverified programs and forego virus detection. The illicit nature of the transaction forces users to rely almost entirely on the reputation of websites, uploaders, and other users to determine if a file is safe to download. …