Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

The World Of Bits, Andrew D. Murray May 2010

The World Of Bits, Andrew D. Murray

Professor Andrew D Murray

This is Chapter One of my forthcoming book Information Technology Law: The Law and Society to be published by Oxford University Press in May 2010. It is made available as a limited preview.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Casualties, Susan W. Brenner, Leo L. Clarke

Susan Brenner

This article is a sequel to Civilians in Cyberwarfare: Conscripts, to be published by the Vanderbilt Journal of Transnational Law. Conscripts addresses the essential role of civilians as participants in cyberwarfare. Here, we explore the potential losses cyberwarfare might cause to civilian entities, including multi-national corporations, utilities, universities and local governments. We explain why cyberwarfare presents unique risks and requires unique executive responses. We also analyze how civilians should manage specific legal liability, political and reputational risks. Finally, we consider whether civilians can expect compensation if the federal government imposes new regulations, appropriates intellectual property, or even conscripts entire businesses …


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Susan Brenner

Civilians will play an integral role in cyberwar because civilian-owned and –operated entities will be a primary target in cyberwarfare. An attacker’s goal in cyberwar is not to capture physical territory but to erode, even destroy, the target nation’s viability as an economy and, indeed, as a sovereign entity. To do that, a cyberattacker will target the companies that own and operate aspects of the victim nation’s critical infrastructure; those civilians will need to be incorporated into a defensive cyberwarfare response structure if such a response is to be effective. We explain why the use of civilians is essential and …


Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes Jan 2010

Context Is Everything: Sociality And Privacy In Online Social Network Sites, Ronald Leenes

Ronald Leenes

Social Network Sites (SNSs) pose many privacy issues. Apart from the fact that privacy in an online social network site may sound like an oxymo- ron, significant privacy issues are caused by the way social structures are currently handled in SNSs. Conceptually different social groups are generally conflated into the singular notion of ‘friend’. This chapter argues that attention should be paid to the social dynamics of SNSs and the way people handle social contexts. It shows that SNS technology can be designed to support audience segregation, which should mitigate at least some of the privacy issues in Social Network …


An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou Jan 2010

An Evolutionary Study Of Cloud Computing Services Privacy Terms, Konstantinos Stylianou

Konstantinos Stylianou

This paper presents an empirical study on the evolution of privacy terms of cloud computing services. The purpose is to see whether the transition to cloud computing also means that users are bound by more intrusive terms of use that pose a greater threat to their privacy. In that direction several typical cloud services (e.g. GoogleDocs, Amazon EC2) are examined from their start of operation till today and numerous versions of their privacy terms are juxtaposed in an effort to pinpoint and interpret the differences between them. The paper concludes that with the spread of cloud computing services more and …