Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Computer Law (7)
- Comparative and Foreign Law (6)
- International Law (5)
- Consumer Protection Law (4)
- Derecho Procesal Civil (4)
-
- Law and Technology (4)
- Science and Technology (4)
- Contracts (3)
- Corporations (3)
- Cyber attack (3)
- Cybersecurity (3)
- Derecho Civil (3)
- Intellectual Property Law (3)
- International law (3)
- Public Law and Legal Theory (3)
- Canada and China (2)
- Commercial Law (2)
- Consent (2)
- Contracting Process (2)
- Electronic Contract (2)
- Human Rights Law (2)
- Jurisprudence (2)
- Law and Society (2)
- Online Amendment (2)
- Politics (2)
- Standard Form Contract (2)
- TORT LAW IN INDIA (2)
- Accounting (1)
- Administrative Law (1)
- Arts (1)
- Publication Year
- Publication
- File Type
Articles 1 - 20 of 20
Full-Text Articles in Computer Law
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Ran Bi
China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.
E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors . Users are easy to become victims of exploitative terms, because their consent has …
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Future Strategies For Improving Consent In Electronic Contracting, Ran Bi
Ran Bi
China's economy has been running deep into an exciting phrase called “Internet +”. In North America, most businesses have online presence and conduct numerous transactions online. Unprecedentedly, electronic contracts have been governing more Individuals and corporations’ legal relationships in a growing proportion of businesses and everyday life.
E-contracts, usually with no physical architecture, are easy to “sign”—people just click one or two icons on a computer / smartphone screen after “reading” (scroll down) the contents. However, e-contracts are standard form contracts which are provided by vendors1. Users2 are easy to become victims of exploitative terms, because their consent has been …
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford
Scott Shackelford
Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Proactive Cybersecurity: A Comparative Industry And Regulatory Analysis, Scott J. Shackelford, Amanda Craig, Janine Hiller
Scott Shackelford
This Article analyzes recent business realities and regulatory trends shaping the proactive cybersecurity industry. To provide a framework for our discussion, we begin by describing the historical development of the industry and how it has been shaped by the applicable law in the United States and other G8 nations. We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric “global security assemblages.” Finally, we assess the emergence of proactive cybersecurity norms, both within industry and international law, and consider the implications of this movement on …
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic
Scott Shackelford
There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson
Hillary A Henderson
Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Malas Leyes, Peores Reglamentos. Apuntes Críticos Sobre El Porvenir De La Tutela De La Persona Frente Al Tratamiento De Datos En El Perú, Leysser L. Leon
Leysser L. León
Se comentan críticamente algunas de las más controvertidas disposiciones contenidas en el reciente Reglamento de la Ley peruana de Protección de Datos Personales. Se echa de menos, en especial, y atendiendo a la labor reglamentaria del Ministerio de Justicia reflejada en este dispositivo, una actitud consciente de los funcionarios acerca la importancia de la tutela de la autodeterminación informativa en los países que, como el Perú, siguen sin resolver graves males sociales, como la discriminación.
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
After Privacy: The Rise Of Facebook, The Fall Of Wikileaks, And Singapore’S Personal Data Protection Act 2012, Simon Chesterman
Simon Chesterman
This article discusses the changing ways in which information is produced, stored, and shared — exemplified by the rise of social-networking sites like Facebook and controversies over the activities of WikiLeaks — and the implications for privacy and data protection. Legal protections of privacy have always been reactive, but the coherence of any legal regime has also been undermined by the lack of a strong theory of what privacy is. There is more promise in the narrower field of data protection. Singapore, which does not recognise a right to privacy, has positioned itself as an e-commerce hub but had no …
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman
Lawrence J. Trautman Sr.
In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …
Injunctions In Domestic Violence: Case Study In Iran, Ehsan Zarrokh
Injunctions In Domestic Violence: Case Study In Iran, Ehsan Zarrokh
Ehsan Zarrokh
As domestic violence becomes increasingly recognized a widespread social problem, judicial system has begun playing larger roles in providing legal protection to these victims. One way they are doing this in the Iran is through the use of protective restraining orders or injunctions. The purpose of this research was to determine if permanent Injunctions for Protection provide victims of Domestic Violence with a sense of security in alleviating fear of retaliation or on-going violence.
El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva
El Derecho De Sucesiones Se Debe Atemperar A Los Cambios De La Sociedad Del Siglo Xxi, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
False Imprisonment As A Tort In India, Hari Priya
False Imprisonment As A Tort In India, Hari Priya
Hari Priya
The tort of false imprisonment is one of the most severe forms of human rights violation, and this paper aims to define and to understand the concept of false imprisonment as a tort in India. It also seeks to know about the evolution of the notion of false imprisonment as a tort, with reference to Indian and foreign cases, and understand who and when can one be held liable for the tort of false imprisonment. It further deals with the remedies available for the said tort.
Tribal Land Laws In Andhra Pradesh, Hari Priya
Section 4 Of The Hindu Succession Act Of 1956, Hari Priya
Section 4 Of The Hindu Succession Act Of 1956, Hari Priya
Hari Priya
A brief write up in the form of a comprehensive article aiming to critically evaluate the Section 4 of the Hindu Succession Act of 1956. The law, as it stands amended, has not only brought about changes in the succession laws of Hindus, but has also paved the way for some positive modifications in the law of partition, alienation of property, inheritance and adoption, and the paper is an effort to evaluate this provision of the law.
La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva
La Cesión De Derechos En El Código Civil Peruano, Edward Ivan Cueva
Edward Ivan Cueva
La Cesión de Derechos en el Código Civil Peruano
Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva
Algunos Apuntes En Torno A La Prescripción Extintiva Y La Caducidad, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Manual De Derecho Procesal Civil, Edward Ivan Cueva
Manual De Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Teoría General De La Prueba Judicial, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Nociones Generales De Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.
Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva
Fundamentos Del Derecho Procesal Civil, Edward Ivan Cueva
Edward Ivan Cueva
No abstract provided.