Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Law

Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby Jun 2006

Spoofing!: Criminal Law, Cyberspace And Egypt, Rim Al Kassaby

Archived Theses and Dissertations

Cyberspace is a fascinating world. As we live in our world, we also live in cyberspace. Life in cyberspace is nothing but a partial reflection of our day to day life, things are done, relations are created and ended, and just like in our real life, crimes could happen.

How can we prevent Cybercrime? Is the legal system ready to incorporate such crime. Is society ready to understand how to prevent such crime? The legal framework as well as the main actors of this legal system such as judges or prosecutors need to be prepared and equipped with proper tools …


Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker Jan 2006

Censors In Cyberspace: Can Congress Protect Children From Internet Pornography Despite Ashcroft V. Aclu?, Amy Wanamaker

Saint Louis University Law Journal

No abstract provided.


Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow Jan 2006

Accessing The Internet Through The Neighbor's Wireless Internet Connection: Physical Trespass In Virtual Reality, Ned Snow

Faculty Publications

As wireless computer networks are becoming commonplace, so also is the practice of accessing the Internet through another's wireless network. The practice raises a simple question of law: Does accessing a wireless network, without express authorization, violate the property rights of the network operator? This Article argues that it does. A neighbor who intentionally accesses the Internet through a network operator's connection appears to trespass on physical property of the operator - the operator's router. Recent Internet jurisprudence suggests that the electronic signals that the neighbor sends through the router are sufficient to find trespassory physical contact. The same jurisprudence …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Jan 2006

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds

Faculty Scholarship

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.


From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs Jan 2006

From St. Ives To Cyberspace: The Modern Distortion Of The Medieval ‘Law Merchant’, Stephen E. Sachs

Faculty Scholarship

Modern advocates of corporate self-regulation have drawn unlikely inspiration from the Middle Ages. On the traditional view of history, medieval merchants who wandered from fair to fair were not governed by domestic laws, but by their own lex mercatoria, or "law merchant. " This law, which uniformly regulated commerce across Europe, was supposedly produced by an autonomous merchant class, interpreted in private courts, and enforced through private sanctions rather than state coercion. Contemporary writers have treated global corporations as descendants of these itinerant traders, urging them to replace conflicting national laws with a transnational law of their own creation. The …


Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler Jan 2006

Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler

Publications

This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.


Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds Jan 2006

Does Power Grow Out Of The Barrel Of A Modem? Some Thoughts On Jack Goldsmith And Tim Wu's 'Who Controls The Internet?', Glenn Harlan Reynolds

Scholarly Works

This review of Jack Goldsmith and Tim Wu's Who Controls the Internet? Illusions of a Borderless World, notes that Goldsmith and Wu are correct in concluding that events in recent years undercut cyber-utopian theories of an Internet that is beyond the reach of national sovereignty. It argues, however, that the failure to achieve such goals does not mean that the Internet is unimportant as a source of expanded freedom and power on the part of ordinary people, and suggests that this trend of individual empowerment is likely to continue.


Cybertrespass And Trespass To Documents, Kevin Emerson Collins Jan 2006

Cybertrespass And Trespass To Documents, Kevin Emerson Collins

Articles by Maurer Faculty

No abstract provided.


Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya Jan 2006

Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya

Publications

No abstract provided.


Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell Jan 2006

Warring Ideologies For Regulating Military Blogs: A Cyberlaw Approach For Balancing Free Speech And Security In Cyberspace, Julia E. Mitchell

Vanderbilt Journal of Entertainment & Technology Law

Part I of this note provides an overview of the use of media during war. It also reviews case law relating to the military's limited right to freedom of speech under the First Amendment. Part II analyzes the problems of regulating milblogs in terms of societal costs and the technological challenges of regulating behavior on the Internet. This note argues that the military's "unexceptionalist" approach toward regulation, wherein it applies the traditional principles embodied in the UCMJ to milblog regulation, undermines its goal of maintaining operational security and impedes the free flow of ideas. Finally, Part II introduces an "exceptionalist" …


Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii Dec 2005

Survey Of The Law Of Cyberspace: Electronic Contracting Cases 2005-2006, Juliet M. Moringiello, William L. Reynolds Ii

Juliet M. Moringiello

This article analyzes the judicial decisions involving Internet and other electronic contracts during the period from July 1, 2005 to June 30, 2006. The authors explain that this year's cases show a maturation of the common law of electronic contracts in that the judges are beginning to recognize the realities of electronic communications and to apply traditional contract principles to those communications unless the realities of the technology justifies a different result.