Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Chapter Four: Information Security, Tracy Mitrano Oct 2016

Chapter Four: Information Security, Tracy Mitrano

Tracy Mitrano

No abstract provided.


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman Feb 2015

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Managing Cyberthreat, Lawrence J. Trautman Jan 2015

Managing Cyberthreat, Lawrence J. Trautman

Lawrence J. Trautman Sr.

Cyber security is an important strategic and governance issue. However, because most corporate CEOs and directors have no formal engineering or information technology training, it is understandable that their lack of actual cybersecurity knowledge is problematic. Particularly among smaller companies having limited resources, knowledge regarding what their enterprise should actually be doing about cybersecurity can’t be all that good. My goal in this article is to explore the unusually complex subject of cybersecurity in a highly readable manner. First, an examination of recent threats is provided. Next, governmental policy initiatives are discussed. Third, some basic tools that can be used …


A Dual Track Approach To Challenging Chinese Censorship In The Wto: The (Future) Case Of Google And Facebook, Anonymous Jun 2013

A Dual Track Approach To Challenging Chinese Censorship In The Wto: The (Future) Case Of Google And Facebook, Anonymous

Michigan Journal of International Law

As economic and trade policies continue to affect more facets of society, the World Trade Organization’s (WTO) impact on government policy and citizens’ lives has grown. Since its creation on January 1, 1995, the WTO has fostered trade liberalization negotiations and served as a forum where member countries can discuss economic concerns with one another. The WTO is perhaps best known for its dispute settlement mechanism. When countries cannot reach a mutual resolution to a conflict governed by a trade agreement, they can initiate formal legal proceedings against one another by asking for a panel to be appointed. The panel …