Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 3 of 3

Full-Text Articles in Computer Law

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple Jan 2022

Institutional Doxing And Attribution: Searching For Solutions To A Law-Free Zone, Kimberlee Styple

Georgia Journal of International & Comparative Law

No abstract provided.


The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson Jan 2022

The Double-Side Of Deepfakes: Obstacles And Assets In The Fight Against Child Pornography, Abigail Olson

Georgia Law Review

Deepfake technology recently took the internet by storm. Although they can be used for both innocuous and nefarious purposes, deepfakes overwhelmingly depict people who appear to be creating nonconsensual pornography. The rise of deepfake technology must be accounted for in the existing federal legal framework, specifically in cases implicating images of children. While deepfakes’ malicious uses ought to be criminalized, exceptions should be made to use deepfake technology as a tool to enforce and deter purveyors of child pornography. This Note explores what the emerging legal framework addressing deepfakes should look like and considers the importance of using the “flipside” …


Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll Jan 2022

Facebook, Crime Prevention, And The Scope Of The Private Search Post-Carpenter, Connor M. Correll

Georgia Law Review

The Fourth Amendment of the U.S. Constitution protects people “against unreasonable searches and seizures.” The private search doctrine provides a notable exception to the Fourth Amendment, providing that the government may reconstruct a search previously performed by a private party without first obtaining a warrant. The U.S. Supreme Court developed the private search doctrine prior to the advent of the internet; however, modern technology has changed the way that individuals live. What was once done entirely in private is now done alongside ever-present third parties, such as cell phones and virtual assistants.

Facebook and other social media sites complicate Fourth …