Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 4 of 4

Full-Text Articles in Law

Cybercrime, Ronald C. Griffin Jan 2012

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.


Sexual Harassment 2.0, Mary Anne Franks Jan 2012

Sexual Harassment 2.0, Mary Anne Franks

Articles

Sexual harassment is a complex and evolving practice. The rise of sexual discrimination in cyberspace is only one of the most recent and most striking examples of the phenomenon's increasing complexity. Sexual harassment law, however, has not kept pace with this evolution. Discrimination law has not been adequately "updated" to address new and amplified practices of sex discrimination. Its two principal limitations are (1) it treats only sexual harassment that occurs in certain protected settings (e.g. the workplace or school) as actionable and (2) it assumes that both the activity and the resulting harm of sexual harassment occur in the …


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble Jan 2012

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble

Scholarly Works

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …


Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott Jan 2012

Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott

Faculty Articles

The United States does not possess a sufficient cyber security framework. Over eighty-five percent of the critical infrastructure in the United States is controlled by private industry. The greatest concern is an intentional cyber attack against electronic control systems that regulate thousands of interconnected computers, routers, and switches. The centralized computer networks controlling the U.S. infrastructure presents tempting targets.

Generally, there are four types of cyber attacks. First, the most common, is service disruption—which aims to flood the target computer with data packets or connection requests, thereby making it unavailable to the user. The second type is designed to capture …