Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 3 of 3
Full-Text Articles in Law
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Chasing Shadows: The Human Face Behind The Cyber Threat, Jim Chirsty
Federal Communications Law Journal
Book Review: Tangled Web: Tales of Digital Crime From the Shadows of Cyberspace, Richard Power, Que, 2000, 450 pages.
Richard Power’s Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace presents a comprehensive account of computer crime. The book unveils and explores in meticulous detail the nature and scope, and—more importantly—the tremendous potential that common criminals, terrorists, and nation-states now have at their fingertips. This Review describes Tangled Web as a must-read for all cyber cops, prosecutors, and information technology heads and policy-makers.
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Cyberspace And The "Devil's Hatband", Jonathan J. Rusch
Seattle University Law Review
In this Article, I maintain that while there is an ongoing conflict of legal traditions over the desirability of fences in cyberspace, there are definite virtues in the creation of such fences, so long as we understand the physical, psychological, and moral dimensions of that process. Part I will present a brief survey of the history of barbed wire in the Old West, paying particular attention to the contending legal traditions that affected the manner and extent of that growth in the West. These contending legal traditions, which related to "fencing in" versus "fencing out" cattle, played a key role …
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Of Black Holes And Decentralized Law Making In Cyberspace, David G. Post
Vanderbilt Journal of Entertainment & Technology Law
MAPS, the primary focus of this tale, is a California non-profit limited liability company. It coordinates a kind of group boycott by Internet service providers (ISPs) for the purpose of reducing the flow of what is commonly called "spam"- unsolicited bulk e-mail. It operates, roughly, as follows. The managers of MAPS create and maintain what they call the "Realtime Blackhole List" (RBL), which consists of a long list of Internet addresses. They place on the RBL any Internet address from which, to their knowledge, spam has originated. They also place on the RBL the address of any network that allows …