Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Computer Law

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García Nov 2010

Uso Social Del Suelo Ejidal Y Comunal Para El Desarrollo Equilibrado De Las Áreas Urbanas Del Estado De Puebla, Bruno L. Costantini García

Bruno L. Costantini García

De origen, difundir los diversos esquemas permitidos por la Ley para posibilitar la realización de proyectos con fines inmobiliarios, a efecto de que los núcleos agrarios y sus integrantes se beneficien equitativamente de la urbanización de sus tierras, coadyuvando con ello al desarrollo urbano planificado y ordenado de los centros de población del Estado de Puebla; como consecuencia, impulsar el desarrollo habitacional equilibrado de éste. Eliminar el circulo.- “necesidad de tierra – asentamiento irregular – solución de conflicto”, mediante la planeación socioeconómico de los núcleos agrarios ejidales y comunales, a fin de diseñar un mecanismo eficaz que satisfaga las necesidades …


Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq. Sep 2010

Los Derechos De Autor Y El Dominio Público, Rodolfo C. Rivas Rea Esq.

Rodolfo C. Rivas

The author discusses the subtle differences between Copyright and Author's Rights. Then he goes into analyzing the different ways a work can become part of the public domain and how it varies from jurisdiction to jurisdiction and from time to time.////////////////////////////////////////////////////El autor analiza las sutiles diferencias entre los derechos de autor y el copyright. Posteriormente se adentra en el análisis de las formas en las que una obra entra dentro del dominio público, y como estas varían dependiendo del territorio y de la época.


Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García Jul 2010

Delimitación Téorica Del Delito Penal Fiscal, Bruno L. Costantini García

Bruno L. Costantini García

Anális de los elementos constitutivos del delito fiscal, la acción delictiva, los grados de ejecución, la consumación y los responsables.

Pretende distinguir el delito penal común del delito penal fiscal con base en sus elementos y pretende aportar una reflexión de la criminalización del delito fiscal en nuestros tiempos, usado por la Autoridad Hacendaria como un medio de represíón y de opresión de los derechos del contribuyente.


La Globalización De La Legislación Cambiaria, Bruno L. Costantini García Jun 2010

La Globalización De La Legislación Cambiaria, Bruno L. Costantini García

Bruno L. Costantini García

No abstract provided.


Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez Apr 2010

Protección De Datos Personales, Bruno L. Costantini García, Norma E. Pimentel Méndez

Bruno L. Costantini García

Introducción a la regulación de la protección de datos personales en México.


An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman Apr 2010

An Illustration Of Hashing And Its Effect On Illegal File Content In The Digital Age, Stephen Hoffman

Stephen P. Hoffman

I aim to show, through practical examples, that computer forensics techniques such as the use of hash values are inherently flawed in tracking illegal computer files. First, I describe the underlying theory of hashing algorithms and hash values, as well as explain that several U.S. government agencies keep detailed file databases in order to track or detect illegal files, e.g. pirated media or child pornography. These databases include the file’s unique hash values. Then, I provide real examples of hash values using MD5 and SHA-1 hashing algorithms to show how extremely minor alterations to a computer file produce radically different …


Derecho De La Seguridad Social En México, Bruno L. Costantini García Feb 2010

Derecho De La Seguridad Social En México, Bruno L. Costantini García

Bruno L. Costantini García

Breve presentación del Derecho de la Segurida Social en México.

¿Qué es?

¿Cómo funciona?

¿Su aplicación?


False Imprisonment As A Tort In India, Hari Priya Jan 2010

False Imprisonment As A Tort In India, Hari Priya

Hari Priya

The tort of false imprisonment is one of the most severe forms of human rights violation, and this paper aims to define and to understand the concept of false imprisonment as a tort in India. It also seeks to know about the evolution of the notion of false imprisonment as a tort, with reference to Indian and foreign cases, and understand who and when can one be held liable for the tort of false imprisonment. It further deals with the remedies available for the said tort.


Tribal Land Laws In Andhra Pradesh, Hari Priya Jan 2010

Tribal Land Laws In Andhra Pradesh, Hari Priya

Hari Priya

No abstract provided.


Section 4 Of The Hindu Succession Act Of 1956, Hari Priya Jan 2010

Section 4 Of The Hindu Succession Act Of 1956, Hari Priya

Hari Priya

A brief write up in the form of a comprehensive article aiming to critically evaluate the Section 4 of the Hindu Succession Act of 1956. The law, as it stands amended, has not only brought about changes in the succession laws of Hindus, but has also paved the way for some positive modifications in the law of partition, alienation of property, inheritance and adoption, and the paper is an effort to evaluate this provision of the law.


Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke Jan 2010

Civilians In Cyberwarfare: Conscripts, Susan W. Brenner, Leo L. Clarke

Vanderbilt Journal of Transnational Law

Civilian-owned and -operated entities will almost certainly be a target in cyberwarfare because cyberattackers are likely to be more focused on undermining the viability of the targeted state than on invading its territory. Cyberattackers will probably target military computer systems, at least to some extent, but in a departure from traditional warfare, they will also target companies that operate aspects of the victim nation's infrastructure. Cyberwarfare, in other words, will penetrate the territorial borders of the attacked state and target high-value civilian businesses. Nation-states will therefore need to integrate the civilian employees of these (and perhaps other) companies into their …


Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas Jan 2010

Doninger's Wedge: Has Avery Doninger Bridged The Way For Internet Versions Of Matthew Fraser?, 43 J. Marshall L. Rev. 439 (2010), Adam Dauksas

UIC Law Review

No abstract provided.


The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams Jan 2010

The Communications Decency Act And New York Times V. Sullivan: Providing Public Figure Defamation A Home On The Internet, 43 J. Marshall L. Rev. 491 (2010), Chris Williams

UIC Law Review

No abstract provided.