Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Law

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland Jan 2020

The Survival Of Critical Infrastructure: How Do We Stop Ransomware Attacks On Hospitals?, Helena Roland

Catholic University Journal of Law and Technology

Our nation’s infrastructure is under an emerging new threat: ransomware attacks. These attacks can cause anything from individual laptops, to entire cities to shut down for a period of time until the victim pays a ransom to the attacker. Unfortunately, these attacks are on the rise and the attackers have a new target: hospitals. Ransomware attacks on hospitals can temporarily shut down operating room technology and limit physician access to patient files, ultimately threatening the safety of hospital patients and the surrounding community. This paper examines how the threat of ransomware attacks on hospitals is on the rise and what …


Where To Prosecute Cybercrimes, Jacob T. Wall May 2019

Where To Prosecute Cybercrimes, Jacob T. Wall

Duke Law & Technology Review

Selecting the appropriate venue for a criminal trial has been a matter of constitutional concern since the founding of the country. The issue is thought to be essential to the fair administration of justice and thus public confidence in the criminal justice system. Constitutionally, crimes must be prosecuted in the states and districts in which they were committed. However, the rise of cybercrime has complicated the venue inquiry: cyberspace, the domain of cybercrime, and physical space have become increasingly decoupled. Consequently, under America’s primary but dated cybercrime law, the ideal location for a trial may not be a constitutionally proper …


Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram Jun 2016

Review Essay: Sara M. Smyth, Cybercrime In Canadian Criminal Law, 2nd Edition (Toronton: Carswell, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

Dr. Smyth’s book is ambitious in its scope, seeking to trace the criminology and evolution of information technologies and cybercrime as the basis of current Canadian legislation and jurisprudence. It is intended as a concise student reference text or resource for those who are new to the subject area, studying in criminology and other areas, as opposed to law. A list of concepts and issues for discussion appears at the conclusion of each chapter and there is a glossary of technical (but not legal) terms at the end of the book. It takes a neutral and professorial approach, seeking to …


Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram Jan 2016

Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

The past decade has seen an enormous explosion of scholarship on the subject of cybercrime, as technologies and offenders pose new challenges and law enforcement, government and academic experts struggle to keep up. The new, second edition of Professor Jonathan Clough’s book occupies a fairly substantial, but specific niche in this increasingly diverse and complex landscape. Principles of Cybercrime contains only a cursory review of the history and criminology of cybercrime, it does not deal at all with IT security, investigative or enforcement matters, and discussion of cybercrime as a global issue is limited to brief discussions of the 2001 …


International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek Sep 2014

International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek

Georgia Journal of International & Comparative Law

No abstract provided.


Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas Sep 2014

Global Cyber Intermediary Liability: A Legal & Cultural Strategy, Jason H. Peterson, Lydia Segal, Anthony Eonas

Pace Law Review

This Article fills the gap in the debate on fighting cybercrime. It considers the role of intermediaries and the legal and cultural strategies that countries may adopt. Part II.A of this Article examines the critical role of intermediaries in cybercrime. It shows that the intermediaries’ active participation by facilitating the transmission of cybercrime traffic removes a significant barrier for individual perpetrators. Part II.B offers a brief overview of legal efforts to combat cybercrime, and examines the legal liability of intermediaries in both the civil and criminal context and in varying legal regimes with an emphasis on ISPs. Aside from some …


State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner Jan 2001

State Cybercrime Legislation In The United States Of America: A Survey, Susan W. Brenner

Richmond Journal of Law & Technology

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.