Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Computer Law

The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto Aug 2019

The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto

Duke Law & Technology Review

No abstract provided.


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott Apr 2015

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Cybercrime, Ronald C. Griffin Jan 2012

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.


Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel Aug 2004

Cyberspace Cartography: The Case Of On-Line Territorial Privacy, Daniel Benoliel

ExpressO

Territorial privacy, one of the central categories of privacy protection, involves setting limit boundaries on intrusion into an explicit space or locale. Initially, the Restatement (Second) of Torts, which defined the privacy tort of intrusion, as applied by courts, most notably designated two classes of excluded areas: “private” places in which the individual can expect to be free from intrusion, and “non-private” places, in which the individual does not have a recognized expectation of privacy. In the physical world, courts ultimately held almost uniformly that the tort of intrusion could not occur in a public place or in a place …


Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel Apr 2001

Trusting And Non-Trusting On The Internet Symposium: Trust Relationships, Tamar Frankel

Faculty Scholarship

The Puzzle: The Internet is a wonderful innovation, allowing people around the world to communicate, trade, and obtain services. Convenient and rich in choices and opportunities, the Internet is tremendously attractive to buyers. Naturally, businesses are flocking to the Internet. The warning has been sounded that those who do not stake a claim in this incredible new communication medium will be left behind to perish. Yet, with all the enthusiasm, many buyers hesitate to take a serious plunge. Businesses are told repeatedly that they must obtain their customers' trust, yet find it more difficult to gain this trust in cyberspace …