Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Verdugo In Cyberspace: Boundaries Of Fourth Amendment Rights For Foreign Nationals In Cybercrime Cases, Stewart M. Young
Michigan Telecommunications & Technology Law Review
This Comment examines the current legal framework governing Fourth Amendment rights for foreign nationals accused of committing crimes within the United States. Over the past three years, federal courts have tried several cases charging foreign nationals with committing crimes through the use of the Internet; these cases demonstrate a lack of clarity in the standard for warrant requirements regarding these searches. Utilizing these cases, this Comment creates a hypothetical case that presents the issues of Fourth Amendment rights for foreign nationals and seeks to determine how such a question should be answered. It advocates the clear application of United States …
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Snake-Oil Security Claims The Systematic Misrepresentation Of Product Security In The E-Commerce Arena, John R. Michener, Steven D. Mohan, James B. Astrachan, David R. Hale
Michigan Telecommunications & Technology Law Review
The modern commercial systems and software industry in the United States have grown up in a snake-oil salesman's paradise. The largest sector of this industry by far is composed of standard commercial systems that are marketed to provide specified functionality (e.g. Internet web server, firewall, router, etc.) Such products are generally provided with a blanket disclaimer stating that the purchaser must evaluate the suitability of the product for use, and that the user assumes all liability for product behavior. In general, users cannot evaluate and cannot be expected to evaluate the security claims of a product. The ability to analyze …
Fool Us Once Shame On You—Fool Us Twice Shame On Us: What We Can Learn From The Privatizations Of The Internet Backbone Network And The Domain Name System, Jay P. Kesan, Rajiv C. Shah
Fool Us Once Shame On You—Fool Us Twice Shame On Us: What We Can Learn From The Privatizations Of The Internet Backbone Network And The Domain Name System, Jay P. Kesan, Rajiv C. Shah
Washington University Law Review
One goal of this Article is to describe and document the privatization processes for the backbone network and the DNS. We initially assumed the privatization of the Internet consisted of a simple shift from a subsidized network to a competitive market for backbone services. However, we found the privatization process to be quite complex and problematic. Unfortunately, many of these same problems are reoccurring in the current privatization of the DNS. Our study found three categories of problems that occurred during the privatizations of the Internet’s backbone network and the DNS: procedural problems, problems with the management of competition, and …