Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Law
Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby
Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby
Archived Theses and Dissertations
Cyberspace is a fascinating world. As we live in our world, we also live in cyberspace. Life in cyberspace is nothing but a partial reflection of our day to day life, things are done, relations are created and ended, and just like in our real life, crimes could happen.
How can we prevent Cybercrime? Is the legal system ready to incorporate such crime. Is society ready to understand how to prevent such crime? The legal framework as well as the main actors of this legal system such as judges or prosecutors need to be prepared and equipped with proper tools …
Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker
Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker
Saint Louis University Law Journal
No abstract provided.
Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow
Faculty Publications
As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds
Faculty Scholarship
This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.
From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs
From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs
Faculty Scholarship
Modern advocates of corporate self-regulation have drawn unlikely inspiration from the Middle Ages. On the traditional view of history, medieval merchants who wandered from fair to fair were not governed by domestic laws, but by their own lex mercatoria, or "law merchant. " This law, which uniformly regulated commerce across Europe, was supposedly produced by an autonomous merchant class, interpreted in private courts, and enforced through private sanctions rather than state coercion. Contemporary writers have treated global corporations as descendants of these itinerant traders, urging them to replace conflicting national laws with a transnational law of their own creation. The …
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Publications
This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.
Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds
Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds
Scholarly Works
This review of Jack Goldsmith and Tim Wu's Who Controls the Internet? Illusions of a Borderless World, notes that Goldsmith and Wu are correct in concluding that events in recent years undercut cyber-utopian theories of an Internet that is beyond the reach of national sovereignty. It argues, however, that the failure to achieve such goals does not mean that the Internet is unimportant as a source of expanded freedom and power on the part of ordinary people, and suggests that this trend of individual empowerment is likely to continue.
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Publications
No abstract provided.
Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell
Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell
Vanderbilt Journal of Entertainment & Technology Law
Part I of this note provides an overview of the use of media during war. It also reviews case law relating to the military's limited right to freedom of speech under the First Amendment. Part II analyzes the problems of regulating milblogs in terms of societal costs and the technological challenges of regulating behavior on the Internet. This note argues that the military's "unexceptionalist" approach toward regulation, wherein it applies the traditional principles embodied in the UCMJ to milblog regulation, undermines its goal of maintaining operational security and impedes the free flow of ideas. Finally, Part II introduces an "exceptionalist" …
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii
Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii
Juliet M. Moringiello