Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Sciences (16)
- Information Security (16)
- Physical Sciences and Mathematics (16)
- Privacy Law (13)
- Computer Law (11)
-
- International Law (10)
- National Security Law (10)
- Internet Law (4)
- Legislation (3)
- Artificial Intelligence and Robotics (1)
- Business (1)
- Business Organizations Law (1)
- Commercial Law (1)
- Corporate Finance (1)
- Economics (1)
- Election Law (1)
- Fourth Amendment (1)
- Health Information Technology (1)
- Health Law and Policy (1)
- International Economics (1)
- International Humanitarian Law (1)
- Medicine and Health Sciences (1)
- Science and Technology Law (1)
- Social and Behavioral Sciences (1)
Articles 1 - 30 of 30
Full-Text Articles in Law
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin
Articles by Maurer Faculty
The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …
Hacking For Intelligence Collection In The Fight Against Terrorism: Israeli, Comparative, And International Perspectives, Asaf Lubin
Articles by Maurer Faculty
תקציר בעברית: הניסיון של המחוקק הישראלי להביא להסדרה מפורשת של סמכויות השב״כ במרחב הקיברנטי משקף מגמה רחבה יותר הניכרת בעולם לעיגון בחקיקה ראשית של הוראות בדבר פעולות פצחנות מצד גופי ביון ומודיעין ורשויות אכיפת חוק למטרות איסוף מודיעין לשם סיכול עבירות חמורות, ובייחוד עבירות טרור אם בעבר היו פעולות מסוג אלה כפופות לנהלים פנימיים ומסווגים, הרי שהדרישה לשקיפות בעידן שלאחר גילויי אדוארד סנודן מחד והשימוש הנרחב בתקיפות מחשב לביצוע פעולות חיפוש וחקירה לסיכול טרור מאידך, מציפים כעת את הדרישה להסמכה מפורשת. במאמר זה אבקש למפות הן את השדה הטכנולוגי והן את השדה המשפטי בכל האמור בתקיפות מחשבים למטרות ריגול ומעקב. …
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Introducing The Global Data Privacy Prize, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Articles by Maurer Faculty
Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government's campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans' credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and …
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Transforming Election Cybersecurity, David P. Fidler
Transforming Election Cybersecurity, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Developments In The Law Affecting Electronic Payments And Financial Services, Sarah Jane Hughes, Stephen T. Middlebrook
Developments In The Law Affecting Electronic Payments And Financial Services, Sarah Jane Hughes, Stephen T. Middlebrook
Articles by Maurer Faculty
No abstract provided.
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Widening The Aperture On Fourth Amendment Interests: A Comment On Orin Kerr's The Fourth Amendment And The Global Internet, David G. Delaney
Articles by Maurer Faculty
Physical-world law may not be suitable for cyberspace. For example, the Supreme Court's "sufficient connection" test in U.S. v. Verdugo-Urquidez (1990) is inconsistent with the century-long trend for courts to find greater constitutional protections for those subject to U.S. jurisdiction outside the United States. Courts must maintain flexibility to conceive of a Fourth Amendment that does not depend exclusively on territory to fulfill its twin aims of ordering government and enabling redress of liberty infringements. Federal and state courts and legislatures addressing searches, seizures, and surveillance in cyberspace should seek simple rules that can easily adapt as cyberspace and government …
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
The Data Protection Credibility Crisis, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Internet Balkanization Gathers Pace: Is Privacy The Real Driver?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson, Orla Lynskey
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney
Articles by Maurer Faculty
In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden's disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity …
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Taking Stock After Four Years, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Articles by Maurer Faculty
No abstract provided.
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Extraterritoriality Of Data Privacy Laws -- An Explosive Issue Yet To Detonate, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The End Of The Beginning, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope
The Sec Staff's "Cybersecurity Disclosure" Guidance: Will It Help Investors Or Cyber-Thieves More?, Sarah Jane Hughes, Roland L. Trope
Articles by Maurer Faculty
No abstract provided.
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Let's Not Kill All The Privacy Laws (And Lawyers), Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Privacy -- An Elusive Concept, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Moving Forward Together, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Editorial, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Cybertrespass And Trespass To Documents, Kevin Emerson Collins
Articles by Maurer Faculty
No abstract provided.
Law In Cyberspace, Fred H. Cate