Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Assembly Bill 1377 (1)
- Computer crimes Political aspects (1)
- Computer crimes Social aspects (1)
- Computer networks Access control Political aspects (1)
- Computer networks Security measures Political aspects (1)
-
- Cyber-physical device security (1)
- Data privacy (1)
- Data protection (1)
- Family Housing (1)
- Hackers (1)
- Hacktivism (1)
- Information technology Political aspects (1)
- Information technology Social aspects (1)
- Information technology law (1)
- Information warfare (1)
- Information warfare. (1)
- Internet of Things (IoT) (1)
- Legal reform (1)
- Legislation (1)
- Nigeria (1)
- Organizational Communication (1)
- Organizational Theory of Identity (1)
- Product liability law (1)
- Students with Children (1)
- Publication
- Publication Type
Articles 1 - 4 of 4
Full-Text Articles in Law
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Will Products Liability Litigation Help Protect Iot Users From Cyber-Physical Attacks?, J Royce Fichtner, Troy J. Strader
Journal of International Technology and Information Management
While there is an identifiable trend towards protecting consumers from data breaches and data misuses related to IoT devices through new legislation, new regulations, government enforcement actions, and private lawsuits, there has been little progress towards creating similar legally enforceable standards of care for “cyber-physical device security.” This article explores this underdeveloped area of academic inquiry into cyber-physical device security within the context of product liability litigation in the United States. The two questions addressed in this article are: (1) Have there been any successful products liability court decisions in the United States that have held IoT manufacturers liable for …
Welcoming Families With Children To Csusb: Making An Intergenerational Difference, Leslie Leach
Welcoming Families With Children To Csusb: Making An Intergenerational Difference, Leslie Leach
Electronic Theses, Projects, and Dissertations
Coming back to school after a gap in your education can be a daunting task. For students with children (SWC), the undertaking has different challenges than their classmates. Providing resources geared towards their success plays a significant role in the student's ability to complete their education. It also allows the SWC to feel a sense of belonging within their institution of higher learning. This project analyzes other California State Universities' family housing programs to advocate a similar program at California State University, San Bernardino. Using the Communication Theory of Identity (CTI) and Organizational Identity (OI), I can illustrate how resources …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
The Internet, Anonymous, And Our Public Identities Recreating Democracy, Leslie Anne Hutchinson
Theses Digitization Project
This study discusses the pursuit of understanding how the discursive construction of the internet affects individuals, identities, and democracy. it also discusses the internet within theoretical positions on its history, the public sphere, and revolutionary politics. Western governments have created legislation regulating the internet for democratic purposes, and this study examines how different and often contrasting views of democracy have shaped the way those of us connected to the internet can speak about it. The Anonymous identity, articulates one such contrast. Anonymous constructs an alternative, Internet identity-one stemming from the identity of the hacker. Policies targeted at stopping hackers and …