Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 6 of 6
Full-Text Articles in Law
The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza
The Price-Anderson Public Liability Action And Strict Liability, Donald E. Jose, Michael A. Garza
ExpressO
Nuclear Power and nuclear weapons plants seem to be an ultrahazardous activity for which strict liability should apply. However, unusual provisions of the Price-Anderson Act serve to shield nuclear power and nuclear weapons plants and associated activities from strict liability unless the federaq agency regulating the activity determins that a special from of strict liability can be applied.
Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski
Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski
ExpressO
This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.
Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.
Awareness of the risks of cybercrime …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
Applying Tort Theory To Information Technology, Marvin L. Longabaugh
ExpressO
In this article, I discuss the issue of whether torts attributable to Information Systems products, both hardware and software, should be subject to litigation as a contract action, a tort action, or both. I further suggest a protocol for attorneys and courts to consider when attempting to discern whether a particular cause of action is appropriate. Last, I briefly discuss whether the advent of certification programs for computer professionals should result in the courts reconsideration of the concept of computer malpractice.
A Powers-Based Approach To Idea-Submission Law, Larissa Katz
A Powers-Based Approach To Idea-Submission Law, Larissa Katz
ExpressO
This paper provides a unified account of idea-submission law in terms of legal powers. It argues that the duty upon a recipient of a novel and original idea results from the exercise of a legal power that the law confers on originators in order to enable them to share their ideas selectively. This paper contributes to our understanding of idea-submission law and to private law theory more generally in a number of ways that have not been addressed in the literature. First, it systematically reveals the lack of fit between the case law and conventional legal theories for the protection …
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.