Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2017

Discipline
Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 173

Full-Text Articles in Computer Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller Dec 2017

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Russell A. Miller

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute protection of a …


An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short Dec 2017

An Economic Analysis Of The Law Surrounding Data Aggregation In Cyberspace, Johnathan M. H. Short

Maine Law Review

The emergence of technological advances has traditionally created new and unique legal problems. The solutions to counter these problems are often drawn from our legal traditions and adapted to an ever-modernizing world. However, as Professor Coase opined at the dawn of the communication technology revolution, “lawyers and economists should not be so overwhelmed by the emergence of new technologies as to change the existing legal and economic system without first making quite certain that this is required.” Examination and reflection, in other words, is paramount to instituting a sound legal framework to encompass developing legal problems in technology. This Article …


Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky Dec 2017

Desperately Seeking Solutions: Using Implementation-Based Solutions For The Troubles Of Information Privacy In The Age Of Data Mining And The Internet Society, Tal Z. Zarsky

Maine Law Review

Our personal information is constantly being recorded, stored and analyzed. Commercial entities watch our every action, storing this data and analyzing it in conjunction with information acquired from third parties. These entities use this knowledge to their benefit (and at times, our detriment) by discriminating between various customers on the basis of this personal information. At the same time, in the media market, large conglomerates can now provide specifically tailored content to individual customers on the basis of such data, thus potentially controlling their perspectives and impairing their autonomy. The expanding use of data mining applications, which enable vendors to …


Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen Dec 2017

Freeing The Mind: Free Software And The Death Of Proprietary Culture, Eben Moglen

Maine Law Review

The subject matter we are going to talk about is variously named and the words have some resonances of importance. I am going to use the phrase “Free Software” to describe this material, and I am going to suggest to you that the choice of words is relevant. We are talking not merely about a form of production or a system of industrial relations, but also about the beginning of a social movement with specific political goals, which will characterize not only the production of software in the twenty-first century, but the production and distribution of culture generally.


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr. Dec 2017

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content …


Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell Dec 2017

Varying Instructional Approaches To Physical Extraction Of Mobile Device Memory, Joan Runs Through, Gary D. Cantrell

Journal of Digital Forensics, Security and Law

Digital forensics is a multidisciplinary field encompassing both computer science and criminal justice. This action research compared demonstrated skill levels of university students enrolled in a semester course in small device forensics with 54 hours of instruction in mobile forensics with an emphasis on physical techniques such as JTAG and Chip-Off extraction against the skill levels of industry professionals who have completed an accelerated 40 hour advanced mobile forensics training covering much of the same material to include JTAG and Chip-Off extraction. Participant backgrounds were also examined to determine if those participants with a background in computer science had an …


Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr. Dec 2017

Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie, Simon Maina Karume Dr.

Journal of Digital Forensics, Security and Law

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as …


Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald Dec 2017

Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald

Journal of Digital Forensics, Security and Law

Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted and the challenges concerning the application of security. The research further explores …


Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black Dec 2017

Evidence Verification Complications With Solid-State Drives, Ryne Teague, Michael Black

Journal of Digital Forensics, Security and Law

Solid-state drives operate on a combination of technologies that create a barrier between the physical data being written and the digital forensics investigator. This barrier prevents the application of evidence verification methods developed for magnetic disk drives because the barrier prevents the investigator from directly controlling and therefore verifying that the underlying physical data has not been manipulated. The purpose of this research is to identify a period of inactivity where the underlying physical data is not being manipulated by wear leveling or garbage collection routines such that evidence can be reliably verified with existing hashing algorithms. An experiment is …


Cover Front Dec 2017

Cover Front

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter Dec 2017

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter Dec 2017

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Cover Back Dec 2017

Cover Back

Journal of Digital Forensics, Security and Law

No abstract provided.


Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele Dec 2017

Data Protection In Nigeria: Addressing The Multifarious Challenges Of A Deficient Legal System, Roland Akindele

Journal of International Technology and Information Management

This paper provides an overview of the current state of privacy and data protection policies and regulations in Nigeria. The paper contends that the extant legal regime in Nigeria is patently inadequate to effectively protect individuals against abuse resulting from the processing of their personal data. The view is based on the critical analysis of the current legal regime in Nigeria vis-à-vis the review of some vital data privacy issues. The paper makes some recommendations for the reform of the law.


Regulating Black-Box Medicine, W. Nicholson Price Ii Dec 2017

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they …


Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin Nov 2017

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin

Jens David Ohlin

When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear. To …


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii Nov 2017

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in medicine, including …


Algorithmic Jim Crow, Margaret Hu Nov 2017

Algorithmic Jim Crow, Margaret Hu

Margaret Hu

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on …


The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah Nov 2017

The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah

Michigan Telecommunications & Technology Law Review

Until the December 2016 passage of the Cures Act, the FDA had regulatory power over clinical decision support (CDS) software; however, the Act removed a large group of CDS software from the FDA’s statutory authority. Congressional intent was to increase innovation by removing regulatory blockades—such as device testing and certification—from the FDA’s purview. This note argues that the enactment of this specific provision of the Act will instead stymie innovation and overlook the unfortunate safety consequences inherent in its deregulation. CDS software is a burgeoning field ripe for innovation; however, rapid innovation can often lead to a slew of mistakes—mistakes …


Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin Nov 2017

Terrorists Are Always Muslim But Never White: At The Intersection Of Critical Race Theory And Propaganda, Caroline Mala Corbin

Fordham Law Review

When you hear the word “terrorist,” who do you picture? Chances are, it is not a white person. In the United States, two common though false narratives about terrorists who attack America abound. We see them on television, in the movies, on the news, and, currently, in the Trump administration. The first is that “terrorists are always (brown) Muslims.” The second is that “white people are never terrorists.” Different strands of critical race theory can help us understand these two narratives. One strand examines the role of unconscious cognitive biases in the production of stereotypes, such as the stereotype of …


Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko Nov 2017

Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko

Journal of Digital Forensics, Security and Law

Digital technology nowadays covers all the spheres of life of an individual and society’s activities. With this, it is not a secret that it can be used both for the benefit and to the detriment of the person. In digital age, private life is becoming most vulnerable to arbitrary interference. This article considers various violations of the rights to privacy, communication safety and inviolability of privacy security brought in by the digital revolution. The article concludes that the most important task in the sphere of private life safety is to find a balance of interests of the state, the society …


Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen Nov 2017

Free Speech And The Confluence Of National Security And Internet Exceptionalism, Alan K. Chen

Fordham Law Review

In this Article, I argue that, notwithstanding these contemporary developments, the Court got it mostly right in Brandenburg. Or, I want to at least suggest that it is premature to reconstruct the Brandenburg test to address perceived changes in our global environment. For the most part, Brandenburg has succeeded in mediating the balance between protecting political or ideological advocacy and enabling the government to regulate actual incitement, even in the contemporary era. Moreover, I argue that society should be especially wary of calls to narrow Brandenburg’s speech-protective standard because such changes might be significantly influenced by the confluence of two …


The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes Nov 2017

The Internet Will Not Break: Denying Bad Samaritans § 230 Immunity, Danielle Keats Citron, Benjamin Wittes

Fordham Law Review

Section 230 is overdue for a rethinking. If courts do not construe the scope of federal immunity to avoid injustice, we argue, Congress should amend the law. This is not to discount the important role that the immunity provision has played over the past twenty years. Far from it. Section 230 immunity has enabled innovation and expression beyond the imagination of the operators of early bulletin boards and computer service providers the provision was designed to protect. But its overbroad interpretation has left victims of online abuse with no leverage against site operators whose business models facilitate abuse. This state …


The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor Nov 2017

The Role Of Internet Intermediaries In Tackling Terrorism Online, Raphael Cohen-Almagor

Fordham Law Review

Gatekeeping is defined as the work of third parties “who are able to disrupt misconduct by withholding their cooperation from wrongdoers.”1 Internet intermediaries need to be far more proactive as gatekeepers than they are now. Socially responsible measures can prevent the translation of violent thoughts into violent actions. Designated monitoring mechanisms can potentially prevent such unfortunate events. This Article suggests an approach that harnesses the strengths and capabilities of the public and private sectors in offering practical solutions to pressing problems. It proposes that internet intermediaries should fight stringently against terror and further argues that a responsible gatekeeping approach is …


Terrorist Advocacy And Exceptional Circumstances, David S. Han Nov 2017

Terrorist Advocacy And Exceptional Circumstances, David S. Han

Fordham Law Review

This Article proceeds as follows. Part I discusses the harmful effects of terrorist advocacy and outlines the present doctrinal treatment of such speech. Part II discusses the issue of exceptional circumstances and highlights the two approaches courts might take to account for them: applying strict scrutiny to the case at hand or broadly reformulating the First Amendment’s doctrinal boundaries. Part III sets forth my central thesis: courts should adhere to case-by-case strict scrutiny analysis, rather than broad doctrinal reformulation, as the initial means of accounting for exceptional circumstances with respect to terrorist advocacy. This approach reflects the vital importance of …


Free Speech And National Security Bootstraps, Heidi Kitrosser Nov 2017

Free Speech And National Security Bootstraps, Heidi Kitrosser

Fordham Law Review

It is troubling that courts treat administrative designations—specifically, both FTO determinations and information classification—as bootstraps by which to yank speech restrictions from the clutches of probing judicial scrutiny. This Article builds on existing scholarly critiques to identify and examine the common thread of national security bootstrapping that runs through both sets of cases. The hope is that in so doing, some greater light may be shed both on the cases themselves and, more broadly, on the costs and benefits of judicial deference to executive national security claims where civil rights and civil liberties are at stake.


Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman Nov 2017

Entertaining Satan: Why We Tolerate Terrorist Incitement, Andrew Koppelman

Fordham Law Review

Words are dangerous. That is why governments sometimes want to suppress speech. The law of free speech reflects a settled decision that, at the time that law was adopted, the dangers were worth tolerating. But people keep dreaming up nasty new things to do with speech. Recently, the Islamic State of Iraq and Syria (ISIS) and other terrorist organizations have employed a small army of Iagos on the internet to recruit new instruments of destruction. Some of what they have posted is protected speech under present First Amendment law. In response, scholars have suggested that there should be some new …


Government Speech And The War On Terror, Helen Norton Nov 2017

Government Speech And The War On Terror, Helen Norton

Fordham Law Review

This Article examines how the government’s speech in the War on Terror can threaten free speech, equal protection, and due process values. It focuses primarily on the constitutional harms threatened by the government’s speech itself (what some call a form of “soft law”), rather than on situations in which the government’s speech may be evidence of a constitutionally impermissible motive for its “hard law” actions.


Terrorizing Advocacy And The First Amendment: Free Expression And The Fallacy Of Mutual Exclusivity, Martin H. Redish, Matthew Fisher Nov 2017

Terrorizing Advocacy And The First Amendment: Free Expression And The Fallacy Of Mutual Exclusivity, Martin H. Redish, Matthew Fisher

Fordham Law Review

Traditional free speech doctrine is inadequate to account for modern terrorist speech. Unprotected threats and substantially protected lawful advocacy are not mutually exclusive. This Article proposes recognizing a new hybrid category of speech called “terrorizing advocacy.” This is a type of traditionally protected public advocacy of unlawful conduct that simultaneously exhibits the unprotected pathologies of a true threat. This Article explains why this new category confounds existing First Amendment doctrine and details a proposed model for how the doctrine should be reshaped.


The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum Nov 2017

The Internet As Marketplace Of Madness— And A Terrorist’S Best Friend, Thane Rosenbaum

Fordham Law Review

The panel I was assigned to, for this distinguished gathering of scholars at Fordham Law School, where I had previously been a professor for twentythree years, was given the name, “Caution Against Overreaching.” Overreaching and the caution it occasions, in this case, refer to the First Amendment, a uniquely American absolutist, legalistic obsession. For many who fixate on such matters, the government must never be allowed to trample upon the unfettered free speech rights guaranteed under America’s first, and most favorite, Amendment.