Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (3)
- Science and Technology Law (3)
- Intellectual Property Law (2)
- Military, War, and Peace (2)
- American Politics (1)
-
- Antitrust and Trade Regulation (1)
- Business Organizations Law (1)
- Communications Law (1)
- Computer Engineering (1)
- Computer Sciences (1)
- Conflict of Laws (1)
- Databases and Information Systems (1)
- Emergency and Disaster Management (1)
- Engineering (1)
- Fourth Amendment (1)
- Information Security (1)
- Infrastructure (1)
- International Law (1)
- Military and Veterans Studies (1)
- National Security Law (1)
- Other Political Science (1)
- Physical Sciences and Mathematics (1)
- Political Science (1)
- Privacy Law (1)
- Public Administration (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Science and Technology Policy (1)
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Computer Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Newsroom: Fcc's Sohn On Consumer Protection, Roger Williams University School Of Law
Life of the Law School (1993- )
No abstract provided.
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
Obscured By Clouds: The Fourth Amendment And Searching Cloud Storage Accounts Through Locally Installed Software, Aaron J. Gold
William & Mary Law Review
No abstract provided.
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson
Loyola of Los Angeles Law Review
Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Net Neutrality - Computer Law, Matthew Charles Quattrochi
Matthew Charles Quattrochi
The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of this work will be dedicated to explaining …
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
The Multiplicity Of Copyright Laws On The Internet, Marketa Trimble
Scholarly Works
From the early days of the Internet, commentators have warned that it would be impossible for those who act on the Internet (“Internet actors”) to comply with the copyright laws of all Internet-connected countries if the national copyright laws of all those countries were to apply simultaneously to Internet activity. A multiplicity of applicable copyright laws seems plausible at least when the Internet activity is ubiquitous — i.e., unrestricted by geoblocking or by other means — given the territoriality principle that governs international copyright law and the choice-of-law rules that countries typically use for copyright infringements.
This Article posits that …
Communication In Cyberspace, Nancy Leong, Joanne Morando
Communication In Cyberspace, Nancy Leong, Joanne Morando
Sturm College of Law: Faculty Scholarship
This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language.
This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way …