Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Censorship (2)
- Blocking statutes (1)
- Congressional oversight (1)
- Constitutional powers (1)
- Cyber operations (1)
-
- Cyber-attacks (1)
- Cyber-operations (1)
- Cyberwar (1)
- Defend Forward (1)
- Digital revolution (1)
- Disinformation (1)
- EU General Data Protection Regulation (1)
- Escalation (1)
- Federal Rule 44.1 (1)
- Foreign affairs powers (1)
- Forum non conveniens (1)
- Free Expression (1)
- Free online speech (1)
- Free speech (1)
- Information conflict (1)
- Intelligence law (1)
- International law (1)
- Law (1)
- Methodological analysis (1)
- Misinformation (1)
- Offences Against the State Acts (1)
- Open internet (1)
- Public health (1)
- SSRN (1)
- Section 1782 (1)
Articles 1 - 5 of 5
Full-Text Articles in Internet Law
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Federal Rule 44.1: Foreign Law In U.S. Courts Today, Vivian Grosswald Curran
Articles
This article presents an in-depth analysis of the latent methodological issues that are as much a cause of U.S. federal court avoidance of foreign law as are judicial difficulties in obtaining foreign legal materials and difficulties in understanding foreign legal orders and languages. It explores Rule 44.1’s inadvertent introduction of a civil-law method into a common-law framework, and the results that have ensued, including an incomplete transition of foreign law from being an issue of fact to becoming an issue of law. It addresses the ways in which courts obtain information about foreign law today, suggesting among others the methodological …
Covert Deception, Strategic Fraud, And The Rule Of Prohibited Intervention (Originally Published As Part Of The Hoover Institution’S Aegis Series), Gary Corn
Joint PIJIP/TLS Research Paper Series
No abstract provided.
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Government Information Crackdowns In The Covid-19 Pandemic, Justin Sherman
Joint PIJIP/TLS Research Paper Series
The Covid-19 pandemic has illustrated the importance of accurate, real-time information and empirical data in a rapidly evolving crisis. Yet it has also captured an opposite issue: the spread of misinformation and disinformation during a public health crisis. Numerous governments have used the Covid-19 pandemic as reason to, legitimately or illegitimately, heighten existing state censorship practices or introduce new practices entirely under the justification of stopping false information about the virus. This report analyzes developments in China, India, and Russia as case studies of government censorship amid the public health crisis. It offers five key takeaways from these case studies. …
New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue
New Media, Free Expression, And The Offences Against The State Acts, Laura K. Donohue
Georgetown Law Faculty Publications and Other Works
New media facilitates communication and creates a common, lived experience. It also carries the potential for great harm on an individual and societal scale. Posting integrates information and emotion, with study after study finding that fear and anger transfer most readily online. Isolation follows, with insular groups forming. The result is an increasing bifurcation of society. Scholars also write about rising levels of depression and suicide that stem from online dependence and replacing analogical experience with digital interaction, as well as escalating levels of anxiety that are rooted in the validation expectation of the ‘like’ function. These changes generate instability …
Cyberattacks And The Constitution, Matthew C. Waxman
Cyberattacks And The Constitution, Matthew C. Waxman
Faculty Scholarship
Contrary to popular view, cyberattacks alone are rarely exercises of constitutional war powers – and they might never be. They are often instead best understood as exercises of other powers pertaining to nonwar military, foreign affairs, intelligence, and foreign commerce, for example. Although this more fine-grained, fact-specific conception of cyberattacks leaves room for broad executive leeway in some contexts, it also contains a strong constitutional basis for legislative regulation of cyber operations.