Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 11 of 11

Full-Text Articles in Computer Law

Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita Oct 2017

Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita

St. Mary's Journal on Legal Malpractice & Ethics

The use of electronic social communication has grown at a phenomenal rate. Facebook, the most popular social networking website, has over 1,968,000,000 users—a number that has exponentially grown since its inception in 2004. The number of judges accessing and using electronic social media (ESM) has also increased. However, unlike the general population, judges must consider constitutional, ethical, technical, and evidentiary implications when they use and access ESM. The First Amendment forbids “abridging the freedom of speech” and protects the expression of personal ideas, positions, and views. However, the American Bar Association’s Model Code of Judicial Conduct and the Texas Code …


Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James Sep 2017

Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James

Journal of Digital Forensics, Security and Law

Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …


Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James Sep 2017

Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James

Journal of Digital Forensics, Security and Law

When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …


The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow Aug 2017

The Tax Treatment Of Tokens: What Does It Betoken?, David J. Shakow

All Faculty Scholarship

Digital tokens have been used to raise substantial amounts of money. But little attention has been paid to the tax consequences surrounding their issuance and sale. There are significant potential tax liabilities lurking in the use of digital tokens. But, because of the anonymity inherent in the blockchain structures used for the issuance of tokens and payments for them, there is a significant question as to whether those tax liabilities will ever be collected.


Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr Jun 2017

Regulating By Robot: Administrative Decision Making In The Machine-Learning Era, Cary Coglianese, David Lehr

All Faculty Scholarship

Machine-learning algorithms are transforming large segments of the economy, underlying everything from product marketing by online retailers to personalized search engines, and from advanced medical imaging to the software in self-driving cars. As machine learning’s use has expanded across all facets of society, anxiety has emerged about the intrusion of algorithmic machines into facets of life previously dependent on human judgment. Alarm bells sounding over the diffusion of artificial intelligence throughout the private sector only portend greater anxiety about digital robots replacing humans in the governmental sphere. A few administrative agencies have already begun to adopt this technology, while others …


Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan May 2017

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan

LLM Theses

With Internet usage on the rise, it is important for India to establish an effective regulatory regime to combat piracy and mass copyright infringement online. This thesis argues that, in the face of unique legal and cultural challenges specific to India, present laws in the country have failed to do so. Unless and until these challenges are met it will be difficult to have an effective mechanism that deals with online copyright infringement. Countries like the United States, Canada, Ireland, and France have all adopted different regulatory models. However, this thesis argues that each not only have significant limitations on …


Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones Mar 2017

Having An Affair May Shorten Your Life: The Ashley Madison Suicides, Sakinah N. Jones

Georgia State University Law Review

Ashley Madison is an online dating service originally designed for people in committed relationships who want to cheat on their partners. In 2015, the website claimed to be “100% discreet.” Ashley Madison’s FAQs promised that its users would never compromise their “safety, privacy or security” and would never have to reveal their identities unless they chose to.

Ashley Madison’s concept attracted over forty million ostensibly anonymous members to its site. In July 2015, a group calling itself The Impact Team (Impact) hacked into Ashley Madison’s parent company, Avid Life Media, Inc. (Avid Life), breaching its security walls and reaching directly …


Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri Jan 2017

Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri

Articles

Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …


Cybersecurity Stovepiping, David Thaw Jan 2017

Cybersecurity Stovepiping, David Thaw

Articles

Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.

This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …


First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell Jan 2017

First They Came For The Child Pornographers: The Fbi's International Search Warrant To Hack The Dark Web, Zoe Russell

St. Mary's Law Journal

Abstract forthcoming.


Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza Jan 2017

Network Investigation Techniques: Government Hacking And The Need For Adjustment In The Third-Party Doctrine, Eduardo R. Mendoza

St. Mary's Law Journal

Modern society is largely dependent on technology, and legal discovery is no longer limited to hard-copy, tangible documents. The clash of technology and the law is an exciting, yet dangerous phenomena; dangerous because our justice system desperately needs technological progress. The clash between scientific advancement and the search for truth has recently taken an interesting form—government hacking. The United States Government has increasingly used Network Investigation Techniques (NITs) to target suspects in criminal investigations. NITs operate by identifying suspects who have taken affirmative steps to conceal their identity while browsing the Internet. The hacking technique has become especially useful to …