Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Computer Law

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


Five Approaches To Insuring Cyber Risks, Christopher C. French Jan 2021

Five Approaches To Insuring Cyber Risks, Christopher C. French

Maryland Law Review

No abstract provided.


Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale Jan 2017

Toward A Fourth Law Of Robotics: Preserving Attribution, Responsibility, And Explainability In An Algorithmic Society, Frank A. Pasquale

Faculty Scholarship

No abstract provided.


The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron Jan 2016

The Privacy Policymaking Of State Attorneys General, Danielle Keats Citron

Faculty Scholarship

No abstract provided.


Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker Oct 2015

Why Education In The Law And Policy Of Cybersecurity Is A Must, Markus Rauschecker

Homeland Security Publications

No abstract provided.


Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale Apr 2014

Ip Law Book Review: Configuring The Networked Self: Law, Code, And The Play Of Every Day Practice, Frank A. Pasquale

Faculty Scholarship

Julie Cohen's Configuring the Networked Self is an extraordinarily insightful book. Cohen not only applies extant theory to law; she also distills it into her own distinctive social theory of the information age. Thus, even relatively short sections of chapters of her book often merit article-length close readings. I here offer a brief for the practical importance of Cohen’s theory, and ways it should influence intellectual property policy and scholarship.


Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr. Jan 2014

Speculative Tech: The Bitcoin Legal Quagmire & The Need For Legal Innovation, Paul H. Farmer Jr.

Journal of Business & Technology Law

No abstract provided.


Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley Jan 2014

Intellectual Property Issues In The Network Cloud: Virtual Models And Digital Three-Dimensional Printers, Darrell G. Mottley

Journal of Business & Technology Law

No abstract provided.


Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby Jan 2014

Policing The Social Media Water Cooler: Recent Nlrb Decisions Should Make Employers Think Twice Before Terminating An Employee For Comments Posted On Social Media Sites, Eric Raphan, Sean Kirby

Journal of Business & Technology Law

No abstract provided.


Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah Jan 2013

Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah

Journal of Business & Technology Law

No abstract provided.


A Commission On A Cyber Mission, Adrian Wilairat Jan 2013

A Commission On A Cyber Mission, Adrian Wilairat

Journal of Business & Technology Law

No abstract provided.


Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean Jan 2013

Dependence On Cyberscribes - Issues In E-Security, Thomas R. Mclean, Alexander B. Mclean

Journal of Business & Technology Law

No abstract provided.


Compliance In The Ether: Cloud Computing, Data Security And Business Regulation, J. Nicholas Hoover Jan 2013

Compliance In The Ether: Cloud Computing, Data Security And Business Regulation, J. Nicholas Hoover

Journal of Business & Technology Law

No abstract provided.


The Anonymous Internet, Bryan H. Choi Jan 2013

The Anonymous Internet, Bryan H. Choi

Maryland Law Review

No abstract provided.


Sealand, Havenco, And The Rule Of Law, James Grimmelmann Jan 2012

Sealand, Havenco, And The Rule Of Law, James Grimmelmann

Faculty Scholarship

In 2000, a group of American entrepreneurs moved to a former World War II anti-aircraft platform in the North Sea, seven miles off the British coast, and launched HavenCo, one of the strangest start-ups in Internet history. A former pirate radio broadcaster, Roy Bates, had occupied the platform in the 1960s, moved his family aboard, and declared it to be the sovereign Principality of Sealand. HavenCo's founders were opposed to governmental censorship and control of the Internet; by putting computer servers on Sealand, they planned to create a "data haven" for unpopular speech, safely beyond the reach of any other …


The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann Apr 2009

The Google Book Search Settlement: Ends, Means, And The Future Of Books, James Grimmelmann

Faculty Scholarship

For the past four years, Google has been systematically making digital copies of books in the collections of many major university libraries. It made the digital copies searchable through its web site--you couldn't read the books, but you could at least find out where the phrase you're looking for appears within them. This outraged copyright owners, who filed a class action lawsuit to make Google stop. Then, last fall, the parties to this large class action announced an even larger settlement: one that would give Google a license not only to scan books, but also to sell them.

The settlement …