Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (55)
- Science and Technology Law (50)
- Computer Sciences (49)
- Physical Sciences and Mathematics (49)
- Information Security (46)
-
- Privacy Law (42)
- Intellectual Property Law (39)
- Communications Law (22)
- Constitutional Law (22)
- Social and Behavioral Sciences (21)
- Criminal Law (20)
- International Law (17)
- First Amendment (15)
- National Security Law (15)
- Forensic Science and Technology (14)
- Legal Studies (14)
- Engineering (13)
- Computer Engineering (12)
- Law and Society (11)
- Consumer Protection Law (10)
- Civil Rights and Discrimination (8)
- Electrical and Computer Engineering (8)
- Administrative Law (7)
- Comparative and Foreign Law (6)
- Fourth Amendment (6)
- Health Law and Policy (6)
- Legislation (6)
- Civil Law (5)
- Institution
-
- Embry-Riddle Aeronautical University (45)
- Fordham Law School (17)
- Schulich School of Law, Dalhousie University (14)
- Southern Methodist University (9)
- Selected Works (7)
-
- UIC School of Law (6)
- University of Colorado Law School (6)
- University of Michigan Law School (6)
- University of Oklahoma College of Law (5)
- University of Washington School of Law (5)
- Boston University School of Law (4)
- University of Maryland Francis King Carey School of Law (4)
- Vanderbilt University Law School (4)
- Florida State University College of Law (3)
- Maurer School of Law: Indiana University (3)
- St. Mary's University (3)
- University of Maine School of Law (3)
- University of Pennsylvania Carey Law School (3)
- Washington and Lee University School of Law (3)
- Brooklyn Law School (2)
- Cornell University Law School (2)
- Georgia State University College of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- University of Pittsburgh School of Law (2)
- University of Richmond (2)
- Bard College (1)
- Brigham Young University Law School (1)
- California State University, San Bernardino (1)
- Central Washington University (1)
- Chicago-Kent College of Law (1)
- Keyword
-
- Privacy (13)
- Criminal law; symposium; communications law; international law; first amendment (11)
- Technology (9)
- Algorithms (8)
- Cybersecurity (8)
-
- Data (6)
- Black box (5)
- Empirical (5)
- Human/computer interaction (5)
- Information technology (5)
- Legal research (5)
- Fourth Amendment (4)
- Health care (4)
- Internet (4)
- Software (4)
- Surveillance (4)
- Artificial intelligence (3)
- Big data (3)
- Cyber security (3)
- Cyberattacks (3)
- Cyberspace (3)
- Data privacy (3)
- Digital forensics (3)
- Elections (3)
- Food and Drug Administration (3)
- Health records (3)
- Information (3)
- Innovation (3)
- Law reform (3)
- Regulation (3)
- Publication
-
- Journal of Digital Forensics, Security and Law (38)
- Fordham Law Review (17)
- Canadian Journal of Law and Technology (13)
- SMU Science and Technology Law Review (9)
- Annual ADFSL Conference on Digital Forensics, Security and Law (7)
-
- Faculty Scholarship (6)
- Oklahoma Journal of Law and Technology (5)
- All Faculty Scholarship (4)
- Articles (4)
- Publications (4)
- Maine Law Review (3)
- Maryland Law Review (3)
- Scholarly Articles (3)
- Technology Law and Public Policy Clinic (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Vanderbilt Journal of Transnational Law (3)
- Articles by Maurer Faculty (2)
- Brooklyn Law Review (2)
- Florida State University Law Review (2)
- Georgia State University Law Review (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review (2)
- Research Data (2)
- Robert Hillman (2)
- St. Mary's Law Journal (2)
- Tech Policy Lab (2)
- UIC Review of Intellectual Property Law (2)
- University of Richmond Law Review (2)
- All Master's Theses (1)
- BYU Law Review (1)
- Publication Type
Articles 1 - 30 of 173
Full-Text Articles in Computer Law
A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller
A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller
Russell A. Miller
Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute protection of a …
An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short
An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short
Maine Law Review
The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article …
Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky
Maine Law Review
Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen
Maine Law Review
The subject matter we are going to talk about is variously named and the words have some resonances of importance. I am going to use the phrase “Free Software” to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.
Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.
Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.
Journal of Digital Forensics, Security and Law
Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell
Journal of Digital Forensics, Security and Law
Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …
Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.
Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.
Journal of Digital Forensics, Security and Law
With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as …
Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald
Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald
Journal of Digital Forensics, Security and Law
Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted and the challenges concerning the application of security. The research further explores …
Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black
Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black
Journal of Digital Forensics, Security and Law
Solid-state drives operate on a combination of technologies that create a barrier between the physical data being written and the digital forensics investigator. This barrier prevents the application of evidence verification methods developed for magnetic disk drives because the barrier prevents the investigator from directly controlling and therefore verifying that the underlying physical data has not been manipulated. The purpose of this research is to identify a period of inactivity where the underlying physical data is not being manipulated by wear leveling or garbage collection routines such that evidence can be reliably verified with existing hashing algorithms. An experiment is …
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele
Journal of International Technology and Information Management
This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.
Regulating Black-Box Medicine, W. Nicholson Price Ii
Regulating Black-Box Medicine, W. Nicholson Price Ii
Michigan Law Review
Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …
Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin
Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin
Jens David Ohlin
When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii
Articles
Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …
Algorithmic Jim Crow, Margaret Hu
Algorithmic Jim Crow, Margaret Hu
Margaret Hu
This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on …
The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah
The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah
Michigan Telecommunications & Technology Law Review
Until the December 2016 passage of the Cures Act, the FDA had regulatory power over clinical decision support (CDS) software; however, the Act removed a large group of CDS software from the FDA’s statutory authority. Congressional intent was to increase innovation by removing regulatory blockades—such as device testing and certification—from the FDA’s purview. This note argues that the enactment of this specific provision of the Act will instead stymie innovation and overlook the unfortunate safety consequences inherent in its deregulation. CDS software is a burgeoning field ripe for innovation; however, rapid innovation can often lead to a slew of mistakes—mistakes …
Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin
Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin
Fordham Law Review
When you hear the word “terrorist,” who do you picture? Chances are, it is not a white person. In the United States, two common though false narratives about terrorists who attack America abound. We see them on television, in the movies, on the news, and, currently, in the Trump administration. The first is that “terrorists are always (brown) Muslims.” The second is that “white people are never terrorists.” Different strands of critical race theory can help us understand these two narratives. One strand examines the role of unconscious cognitive biases in the production of stereotypes, such as the stereotype of …
Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko
Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko
Journal of Digital Forensics, Security and Law
Digital technology nowadays covers all the spheres of life of an individual and society’s activities. With this, it is not a secret that it can be used both for the benefit and to the detriment of the person. In digital age, private life is becoming most vulnerable to arbitrary interference. This article considers various violations of the rights to privacy, communication safety and inviolability of privacy security brought in by the digital revolution. The article concludes that the most important task in the sphere of private life safety is to find a balance of interests of the state, the society …
Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen
Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen
Fordham Law Review
In this Article, I argue that, notwithstanding these contemporary developments, the Court got it mostly right in Brandenburg. Or, I want to at least suggest that it is premature to reconstruct the Brandenburg test to address perceived changes in our global environment. For the most part, Brandenburg has succeeded in mediating the balance between protecting political or ideological advocacy and enabling the government to regulate actual incitement, even in the contemporary era. Moreover, I argue that society should be especially wary of calls to narrow Brandenburg’s speech-protective standard because such changes might be significantly influenced by the confluence of two …
The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes
The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes
Fordham Law Review
Section 230 is overdue for a rethinking. If courts do not construe the scope of federal immunity to avoid injustice, we argue, Congress should amend the law. This is not to discount the important role that the immunity provision has played over the past twenty years. Far from it. Section 230 immunity has enabled innovation and expression beyond the imagination of the operators of early bulletin boards and computer service providers the provision was designed to protect. But its overbroad interpretation has left victims of online abuse with no leverage against site operators whose business models facilitate abuse. This state …
The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor
The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor
Fordham Law Review
Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach is …
Terrorist Advocacy And Exceptional Circumstances, David S. Han
Terrorist Advocacy And Exceptional Circumstances, David S. Han
Fordham Law Review
This Article proceeds as follows. Part I discusses the harmful effects of terrorist advocacy and outlines the present doctrinal treatment of such speech. Part II discusses the issue of exceptional circumstances and highlights the two approaches courts might take to account for them: applying strict scrutiny to the case at hand or broadly reformulating the First Amendment’s doctrinal boundaries. Part III sets forth my central thesis: courts should adhere to case-by-case strict scrutiny analysis, rather than broad doctrinal reformulation, as the initial means of accounting for exceptional circumstances with respect to terrorist advocacy. This approach reflects the vital importance of …
Free Speech And National Security Bootstraps, Heidi Kitrosser
Free Speech And National Security Bootstraps, Heidi Kitrosser
Fordham Law Review
It is troubling that courts treat administrative designations—specifically, both FTO determinations and information classification—as bootstraps by which to yank speech restrictions from the clutches of probing judicial scrutiny. This Article builds on existing scholarly critiques to identify and examine the common thread of national security bootstrapping that runs through both sets of cases. The hope is that in so doing, some greater light may be shed both on the cases themselves and, more broadly, on the costs and benefits of judicial deference to executive national security claims where civil rights and civil liberties are at stake.
Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman
Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman
Fordham Law Review
Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new …
Government Speech And The War On Terror, Helen Norton
Government Speech And The War On Terror, Helen Norton
Fordham Law Review
This Article examines how the government’s speech in the War on Terror can threaten free speech, equal protection, and due process values. It focuses primarily on the constitutional harms threatened by the government’s speech itself (what some call a form of “soft law”), rather than on situations in which the government’s speech may be evidence of a constitutionally impermissible motive for its “hard law” actions.
Terrorizing Advocacy And The First Amendment: Free Expression And The Fallacy Of Mutual Exclusivity, Martin H. Redish, Matthew Fisher
Terrorizing Advocacy And The First Amendment: Free Expression And The Fallacy Of Mutual Exclusivity, Martin H. Redish, Matthew Fisher
Fordham Law Review
Traditional free speech doctrine is inadequate to account for modern terrorist speech. Unprotected threats and substantially protected lawful advocacy are not mutually exclusive. This Article proposes recognizing a new hybrid category of speech called “terrorizing advocacy.” This is a type of traditionally protected public advocacy of unlawful conduct that simultaneously exhibits the unprotected pathologies of a true threat. This Article explains why this new category confounds existing First Amendment doctrine and details a proposed model for how the doctrine should be reshaped.
The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum
The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum
Fordham Law Review
The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.