Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (29)
- International Law (11)
- Intellectual Property Law (10)
- Science and Technology Law (9)
- Communications Law (6)
-
- National Security Law (6)
- Privacy Law (6)
- Jurisdiction (4)
- Military, War, and Peace (4)
- Consumer Protection Law (3)
- International Trade Law (3)
- Social and Behavioral Sciences (3)
- Administrative Law (2)
- Civil Procedure (2)
- Commercial Law (2)
- Comparative and Foreign Law (2)
- Computer Engineering (2)
- Computer Sciences (2)
- Engineering (2)
- International and Area Studies (2)
- Law and Society (2)
- Legal Writing and Research (2)
- Other Computer Engineering (2)
- Physical Sciences and Mathematics (2)
- Transnational Law (2)
- Agency (1)
- Asian Studies (1)
- Business (1)
- Institution
-
- Duke Law (8)
- Maurer School of Law: Indiana University (5)
- Selected Works (4)
- Boston University School of Law (2)
- Embry-Riddle Aeronautical University (2)
-
- Northwestern Pritzker School of Law (2)
- Schulich School of Law, Dalhousie University (2)
- U.S. Naval War College (2)
- University of Baltimore Law (2)
- University of Georgia School of Law (2)
- University of New Hampshire (2)
- University of Richmond (2)
- BLR (1)
- Cleveland State University (1)
- Cornell University Law School (1)
- Florida A&M University College of Law (1)
- Florida International University College of Law (1)
- Georgia State University College of Law (1)
- Mitchell Hamline School of Law (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- Seattle University School of Law (1)
- The University of Akron (1)
- University of Denver (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Washington School of Law (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- Duke Law & Technology Review (8)
- Articles by Maurer Faculty (4)
- Faculty Scholarship (3)
- Canadian Journal of Law and Technology (2)
- International Law Studies (2)
-
- Law Faculty Scholarship (2)
- Northwestern Journal of International Law & Business (2)
- Akron Law Review (1)
- All Faculty Scholarship (1)
- Articles (1)
- Cornell Law School Inter-University Graduate Student Conference Papers (1)
- Dickinson Law Review (2017-Present) (1)
- ExpressO (1)
- Faculty Publications (1)
- Gary C. Kessler (1)
- Georgia Journal of International & Comparative Law (1)
- Georgia State University Law Review (1)
- Global Business Law Review (1)
- Homeland Security Publications (1)
- Indiana Journal of Global Legal Studies (1)
- Journal Publications (1)
- Journal of Digital Forensics, Security and Law (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Law Faculty Publications (1)
- Occasional Papers Series (1)
- Publications (1)
- Richmond Journal of Law & Technology (1)
- Rodolfo C. Rivas (1)
- Seattle University Law Review (1)
- Sturm College of Law: Faculty Scholarship (1)
- Publication Type
Articles 1 - 30 of 50
Full-Text Articles in Computer Law
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan
Canadian Journal of Law and Technology
It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius
Homeland Security Publications
No abstract provided.
Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias
Drawing The Cyber Baseline: The Applicability Of Existing International Law To The Governance Of Information And Communication Technologies, Dapo Akande, Antonio Coco, Talita De Souza Dias
International Law Studies
"Cyberspace" is often treated as a new domain of State activity in international legal discourse. This has led to the assumption that for international law to apply to cyber operations carried out by States or non-State actors, "cyber-specific" State practice and opinio juris must be demonstrated. This article challenges that assumption on five different bases. First, it argues that rules of general international law are generally applicable to all domains, areas, or types of State activity. In their interpretation and application to purported new domains, limitations to their scope of application cannot be presumed. Second, this article demonstrates that the …
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Revolt Against The U.S. Hegemony: Judicial Divergence In Cyberspace, Dongsheng Zang
Articles
This Article contributes to our understanding of the current state of cyber law. The global perspective demonstrates an almost uniform response to the U.S. law in cyberspace from all of America's major trading partners. In the past, comparative studies tended to focus on a single jurisdiction-typically, the European Union-and compared it with the United States. This approach, informative as it was, significantly understated the gravity of the differences between that jurisdiction and the United States. Fundamentally, it was based on an American-centric outlook with primary interests in building convergence models. In cyberspace, however, this is simply not helpful. In recent …
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
International Law Studies
States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …
Information Privacy In An Age Of Invisible Shopper Tracking: Who Will Pay The Price For Stores Of The Future?, Kristin Harripaul
Information Privacy In An Age Of Invisible Shopper Tracking: Who Will Pay The Price For Stores Of The Future?, Kristin Harripaul
Georgia State University Law Review
Explosive growth in technology has brought a unique opportunity to the doors of brick-and-mortar retail—a nearly $3.38 trillion industry struggling to regain relevance among modern, digitally enabled shoppers. Specifically, in-store analytics, or shopper tracking technologies, are allowing these retailers to better compete with online stores by tapping into consumer data unprecedented in the brick-and-mortar context. With these technologies, stores now have access to detailed metrics, like consumer dwell times, journeys, product engagement, product views, and demographic data such as age and gender, which can be used to optimize store operations and marketing and promotions.
Recent events, however, including a string …
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
What Didn’T Happen: An Essay In Speculation, Peter Jaszi
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Independence Of Cyberspace, John Perry Barlow
A Declaration Of The Independence Of Cyberspace, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle
Duke Law & Technology Review
No abstract provided.
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow
Duke Law & Technology Review
No abstract provided.
The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto
The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto
Duke Law & Technology Review
No abstract provided.
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson
Duke Law & Technology Review
No abstract provided.
The Past And Future Of The Internet: A Symposium For John Perry Barlow
The Past And Future Of The Internet: A Symposium For John Perry Barlow
Duke Law & Technology Review
No abstract provided.
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Journal of Digital Forensics, Security and Law
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Interpretation Catalysts In Cyberspace, Rebecca Ingber
Faculty Scholarship
The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …
War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste
War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste
Canadian Journal of Law and Technology
No abstract provided.
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Book Review: Digital Crime And Forensic Science In Cyberspace, Gary C. Kessler
Gary C. Kessler
This document is Dr. Kessler's review of Digital Crime and Forensic Science in Cyberspace, by P. Kanellis, E. Kiountouzis, N. Kolokotronis, and D. Martakos. Idea Group Publishing, 2006. ISBN: 1-59140-873-3.
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
A Roundtable Discussion With Lawrence Lessig, David G. Post & Jeffrey Rosen, Thomas E. Baker
Thomas E. Baker
This article is a transcript of a discussion between Lawrence Lessig, David G. Post and Jeffrey Rosen on a variety of issues surrounding law, technology and the Internet. The moderator was Thomas E. Baker and the discussion was part of a Drake University Law School symposium in February of 2001.
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
On Climate Change And Cyber Attacks: Leveraging Polycentric Governance To Mitigate Global Collective Action Problems, Scott J. Shackelford
Vanderbilt Journal of Entertainment & Technology Law
Although cyberspace and the atmosphere are distinct arenas, they share similar problems of overuse, difficulties of enforcement, and challenges of collective inaction and free riders. With weather patterns changing, global sea levels rising, and temperatures set to exceed 1.5 degrees Celsius by 2100, climate change is a problem that affects the entire world. Yet its benefits are dispersed, and its harms are often concentrated. Similarly, much of the cost of cyber attacks is focused in a few nations even as others are becoming havens for cybercriminals. Yet it is also true that actions taken by a multiplicity of actors on …
Law Reviews And The Migration To Cyberspace, M. Ethan Katsh
Law Reviews And The Migration To Cyberspace, M. Ethan Katsh
Akron Law Review
I am very pleased to contribute an introduction to this issue of the Akron Law Review, the first to appear both in print and on the World Wide Web. There are very few law reviews that have surfaced, thus far, on the World Wide Web. The editors who decided to take this step deserve our respect and admiration. Their decision reflects an understanding that the world of publishing and distributing information has begun to change, and begun to change in a significant way.
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott
Occasional Papers Series
Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …
Communication In Cyberspace, Nancy Leong, Joanne Morando
Communication In Cyberspace, Nancy Leong, Joanne Morando
Sturm College of Law: Faculty Scholarship
This Article examines a problem in cybercrime law that is both persistent and pervasive. What counts as “communication” on the Internet? Defining the term is particularly important for crimes such as cyberstalking, cyberharassment, and cyberbullying, where most statutes require a showing that the alleged perpetrator “communicated” with the victim or impose a similar requirement through slightly different language.
This Article takes up the important task of defining communication. As a foundation to our discussion, we provide the first comprehensive survey of state statutes and case law relating to cyberstalking, cyberharassment, and cyberbullying. We then examine the realities of the way …
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.
Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati
Estrategias De Protección De La Propiedad Intelectual En El Espacio Virtual, Rodolfo C. Rivas Rea, Serah Mutheu Mati
Rodolfo C. Rivas
The authors provide a brief rundown of strategies to protect a wide range of IP rights in cyberspace. The strategies tackle practical advice and suggest a series of progressive actions in order to ensure maximum protection with an efficient use of resources.//////////////////////////////// Los autores proporcionan un breve resumen de las estrategias para proteger una amplia gama de derechos de propiedad intelectual en el ciberespacio. Las estrategias abordan consejos prácticos y sugieren una serie de acciones en orden progresivo con la finalidad de garantizar la máxima protección manteniendo un uso eficiente de los recursos.
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Meatspace, The Internet, And The Cloud: How Changes In Document Storage And Transfer Can Affect Ip Rights, Sharon Sandeen
Faculty Scholarship
This article discusses the intellectual property issues from "meatspace" to online services and the Internet. It further explores intellectual property issues from the Internet to the Cloud. Finally, it discusses the implications of cloud computing for trade secret protection.
Maryland Personal Jurisdiction Law In The Cyberspace Content, Saad Gul
Maryland Personal Jurisdiction Law In The Cyberspace Content, Saad Gul
University of Baltimore Law Forum
A century ago, personal jurisdiction largely hinged on a simple litmus test: the defendant’s presence in the forum state. The issue of personal jurisdiction gained prevalence as the nation evolved from its earlier days of detached, semi-sovereign entities, whose citizens rarely interacted, to a nation where interstate commerce had increased, with interstate litigation growing correspondingly. In Pennoyer v. Neff, the Supreme Court of the United States effectively limited a state’s jurisdiction to persons physically present within its territorial borders. However, in today’s increasingly interconnected world, physical presence appears to represent an anachronism set in the post-Civil War, horse-and-buggy America of …
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler
Articles by Maurer Faculty
No abstract provided.