Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Congressional oversight (2)
- Ransomware (2)
- Artificial intelligence (1)
- Autonomous weapons (1)
- Blocking statutes (1)
-
- CJEU (1)
- COVID-19 (1)
- Charter of fundamental rights (1)
- Communication (1)
- Constitutional powers (1)
- Copyright (1)
- Copyright violations (1)
- Court of justice of the european union (1)
- Cyber (1)
- Cyber operations (1)
- Cyber-attacks (1)
- Cyber-operations (1)
- Cyberattack (1)
- Cybercrime (1)
- Cybersecurity (1)
- Cyberwar (1)
- Defend Forward (1)
- Digital revolution (1)
- Directive 2019/790 (1)
- EU (1)
- EU Directive (1)
- EU Directive 2019/790 (1)
- EU General Data Protection Regulation (1)
- Ecommerce (1)
- Emerging (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Computer Law
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Articles
This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …
Enough Is As Good As A Feast, Noah C. Chauvin
Enough Is As Good As A Feast, Noah C. Chauvin
Seattle University Law Review
Ipse Dixit, the podcast on legal scholarship, provides a valuable service to the legal community and particularly to the legal academy. The podcast’s hosts skillfully interview guests about their legal and law-related scholarship, helping those guests communicate their ideas clearly and concisely. In this review essay, I argue that Ipse Dixit has made a major contribution to legal scholarship by demonstrating in its interview episodes that law review articles are neither the only nor the best way of communicating scholarly ideas. This contribution should be considered “scholarship,” because one of the primary goals of scholarship is to communicate new ideas.
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Poland’S Challenge To Eu Directive 2019/790: Standing Up To The Destruction Of European Freedom Of Expression, Michaela Cloutier
Dickinson Law Review (2017-Present)
In 2019, the European Parliament and Council passed Directive 2019/790. The Directive’s passage marked the end of a fouryear- long legislative attempt to impose more liability for copyright violations on Online Service Providers, an effort which was controversial from the start. Online Service Providers fear that the 2019 Directive, especially its Article 17, will completely change the structure of liability on the Internet, forcing providers to adopt expensive content filtering systems. Free speech advocates fear that ineffective filtering technology will infringe upon Internet users’ rights to express themselves, and legal scholars have pointed out the Directive’s inconsistency with prior European …
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
Literature Review: How U.S. Government Documents Are Addressing The Increasing National Security Implications Of Artificial Intelligence, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
This article emphasizes the increasing importance of artificial intelligence (AI) in military and national security policy making. It seeks to inform interested individuals about the proliferation of publicly accessible U.S. government and military literature on this multifaceted topic. An additional objective of this endeavor is encouraging greater public awareness of and participation in emerging public policy debate on AI's moral and national security implications..
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Cyber Insurance Today: Saving It Before It Needs Saving, Angela Nieves
Catholic University Journal of Law and Technology
Cyber insurance, which covers a company’s losses and costs stemming from a cyberattack, represents a nearly $5 billion global market. But have stakeholders shaped a sustainable model? This article analyzes contrasting claims about the viability of cyber insurance. It proposes measures to ensure the survival of the cyber insurance market, which should be immediately addressed given the current state of the world and the fact that even pre-COVID-19, businesses worldwide stood to lose over $5.2 trillion over the next five years due to cybercrimes. Unless action is taken to mitigate the fallout from cyber events, the cyber insurance market will …
The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal
The Overlapping Web Of Data, Territoriality And Sovereignty, Jennifer Daskal
Contributions to Books
Provides a framework to better understand Global Legal Pluralism and the current international state of law.
Equips practitioners, theorists, and students with deeper insights and analytical tools to describe the conflict among legal and quasi-legal systems.
Analyzes global legal pluralism in light of legal theory, constitutionalism, conflict of laws, international law, commercial transactions, and as it affects indigenous polities, religious orders, and citizenship.
In Memory Of Professor James E. Bond, Janet Ainsworth
In Memory Of Professor James E. Bond, Janet Ainsworth
Seattle University Law Review
Janet Ainsworth, Professor of Law at Seattle University School of Law: In Memory of Professor James E. Bond.
Table Of Contents, Seattle University Law Review
Table Of Contents, Seattle University Law Review
Seattle University Law Review
Table of Contents
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland
Catholic University Journal of Law and Technology
Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.