Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Digital forensics (2)
- Internet (2)
- Propaganda (2)
- Access (1)
- Censorship (1)
-
- Child Exploitation Material (1)
- Computer Cache (1)
- Customs of War (1)
- Cyber Combat (1)
- Cyber-Warfare (1)
- Cybersexuality (1)
- Cyber–Ordnance (1)
- Cyber–Space (1)
- Global Viewpoints (1)
- Hybrid Warfare (1)
- Intention to Possess (1)
- Intention to View (1)
- International Humanitarian Law (1)
- Iran (1)
- Knowing Possession (1)
- Laws of Armed Conflict (1)
- National security (1)
- Perception Management (1)
- Persian Gulf (1)
- Political Campaigns (1)
- Racial Profiling (1)
- Russia (1)
- Surveillance (1)
- Technology (1)
- Unrestricted Warfare (1)
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Law
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Iran, Diane M. Zorri
Iran, Diane M. Zorri
Publications
Internet access in Iran is characterized by strong censorship, limited access, surveillance, and widespread state-sanctioned propaganda. The regime in Tehran views internet freedom as a critical threat to its national security (Henry, Pettyjohn, and York 2014). Using an index of variables such as obstacles to access, limits on content, and violations of user rights, the nongovernmental organization Freedom House rates Iran’s internet access as “not free” (Freedom House 2018). On a scale of zero to one hundred, where zero is “free” and one hundred is “not free,” Freedom House scores Iran at an eighty-five, making it the least free nation …
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Journal of Digital Forensics, Security and Law
When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Applied Aviation Sciences - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
The Political Psychology Of Cybersexuality: The Example Of Child Pornography, Ibpp Editor
The Political Psychology Of Cybersexuality: The Example Of Child Pornography, Ibpp Editor
International Bulletin of Political Psychology
This article analyzes rationales behind legislation banning certain aspects of cybersexuality.
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
Racial Profiling In The Persian Gulf: Ethical, Moral, And Legal Implications, Ibpp Editor
International Bulletin of Political Psychology
This article describes attributions about race and ethnicity that color the discourse on the ethics, morality, and legality of profiling.
The Internet And Political Campaigns: Some Early Considerations, Ibpp Editor
The Internet And Political Campaigns: Some Early Considerations, Ibpp Editor
International Bulletin of Political Psychology
This article provides hypotheses on the effects of the Internet on political campaigns. The IBPP staff hopes that researchers among its readers will attempt to evaluate these hypotheses through combinations of empiricism, rationalism, and other epistemological approaches.