Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
Articles 1 - 3 of 3
Full-Text Articles in Computer Law
Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple
Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple
Georgia Journal of International & Comparative Law
No abstract provided.
The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson
The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson
Georgia Law Review
Deepfake technology recently took the internet by storm. Although they can be used for both innocuous and nefarious purposes, deepfakes overwhelmingly depict people who appear to be creating nonconsensual pornography. The rise of deepfake technology must be accounted for in the existing federal legal framework, specifically in cases implicating images of children. While deepfakes’ malicious uses ought to be criminalized, exceptions should be made to use deepfake technology as a tool to enforce and deter purveyors of child pornography. This Note explores what the emerging legal framework addressing deepfakes should look like and considers the importance of using the “flipside” …
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll
Georgia Law Review
The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.
Facebook and other social media sites complicate Fourth …