Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Cyber warfare; kinetic warfare; chaos theory; Iran; Aegs; United States; keystroke; Tallinn Manual; Morris worm; autonomous; DDoS attack; Russia; Stuxnet; Kaspersky Red October; hackers; back hacking; Shamoon; National Security Agency; WannaCry; malware; Windows; cybersecurity; ransomware; NotPetya; artificial intellegence; international law; Caroline doctrine; UN Charter; NATO; butterfly effect; Edward Lorenz (1)
- Outer space; Treaty on Principles Governing the Activites of States in the Exploration and Use of Outer Space; aerospace; commercial space sector; developing technology; regulation; National Aeronautics and Space Administration; NASA; Apollo 11; SpaceX; Elon Musk; Soviet Union; Blue Origin; appropriation; regulation; liability; legal claim; tort; international; jurisdiction; Congress; business; Convention on International Libability for Damage Caused by Space Objects; debris; Commercial Space Launch Act; Department of Transportation; DOT; Commercial Space Launch Competitiveness Act; Donald Trump; Department of Commerce; DOC; Deep Seabed Hard Mineral Act; DSHMRA; deep sea mining; mining; international waters; property; United Nations Convention on Limitation of Liability for Maritime Claims; maritime; (1)
- Privacy; Data Privacy; Privacy Law; General Data Protection Regulation; GDPR; California Consumer Privacy Act; CCPA; Privacy Regulation; Cyber Security; Cybercrime; Hackers; Internet; Internet Law; Consumer Protection; Computer Law; International Law; Online Privacy; International Privacy; Brazil Data Privacy; GDPL; Massachusetts Data Privacy; Advertising Technology; Digital Advertising; Advertising; Digital Media; Technology; Media; Digital Marketing; Marketing; eCommerce; Intellectual Property; Compliance; Regulatory Compliance; European Union; EU; California; Data Mapping; Data Brokers; Privacy Rights; Personal Information; Information Commissioner’s Office; ICO; Consent; Opt-In; Opt-Out; Erasure; Internet Protocol Address; IP Address; Regulatory Burdens; Compliance Burdens (1)
- Sovereignty; jurisdiction; territoriality; data; technology; international law; state; border; elasticity; cross-border; transfer; regulations; privacy; China; European Union; United States; governance; conceptualization; theory; extraterritoriality; globalization; boundaries; GDPR; protection; digital; MLAT; internet; server; controller; processor; comparative; analysis; Cybersecurity Law; location; localization; infrastructure; network; transnational; CJEU; electronic evidence; provider; communication; CLOUD Act; SCA; DPD; reterritorization; representative; scope; mechanism; approach; dimension; cyberspace; Balkanization; fragmentation; conception; configuration; information; authority; political (1)
Articles 1 - 4 of 4
Full-Text Articles in Internet Law
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Data Governance And The Elasticity Of Sovereignty, Roxana Vatanparast
Brooklyn Journal of International Law
Traditionally, the world map and territorially bounded spaces have dominated the ways in which we imagine how states govern, make laws, and exercise their authority. Under this conception, reflected in traditional international law principles of territorial sovereignty, each state would have exclusive authority to govern and make laws over everything concerning the land within its borders. Yet developments like the proliferation of data flows, which are based on divisible, mobile, and interconnected components of data, are not territorially bounded. This presents a challenge to the traditional bases for territorial sovereignty and jurisdiction under international law, which some scholars claim is …
Easing The Burdens Of A Patchwork Approach To Data Privacy Regulation In Favor Of A Singular Comprehensive International Solution—The International Data Privacy Agreement, Scott Resnick
Brooklyn Journal of International Law
Data privacy has become one of the premier hot-button issues in today’s increasingly digital human experience. Legislatures around the globe have attempted to act swiftly in an effort to safeguard the highly coveted personal information of their citizens and combat misuse at the hands of international businesses operating with an online presence. Since the European Union’s enactment of the General Data Protection Regulation (GDPR) in 2018, countries around the globe have been grappling with how best to replicate the EU’s leading data privacy regulation while providing the same or greater level of transparency into data collection practices. While a mere …
The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff
The Revolution Of The Commercial Space Industry: Why Current Laws Must Be Replaced Before American Business Expands To The Moon And Beyond, Drew M. Fryhoff
Brooklyn Journal of Corporate, Financial & Commercial Law
Space, the final frontier. Resting at the rim of the Earth, an endless void full of opportunity awaits those who are willing to take a leap of faith. Historically, only national space programs have been capable of orchestrating expeditions to outer space. However, American aerospace companies now rival governmental entities in their abilities to operate beyond the Earth’s atmosphere. State-of-the-art developments in aerospace technology have positioned the American commercial space sector to become more productive than national space programs in the years to come. Unfortunately, the potential of the American commercial space sector is severely hindered under the Treaty on …
A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova
A Keystroke Causes A Tornado: Applying Chaos Theory To International Cyber Warfare Law, Daniel Garrie, Masha Simonova
Brooklyn Journal of International Law
Cyber warfare today finds itself on the front page of the news daily. It is increasingly apparent that the cyber domain demands more guidance, with leaders opting for the deployment of cyber capabilities to bypass kinetic warfare norms. Proposed solutions abound, but none adequately address the specific features of cyber warfare that set it apart from traditional kinetic warfare. This Article argues that a new legal framework is necessary to properly address this problem, and such a doctrine should incorporate principles of chaos theory. Chaos theory is a branch of mathematics dealing with complex systems, with the most well-known example …