Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Internet Law

Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse May 2023

Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse

Major Papers

This major paper examines the Cuban embargo as an ineffective hard power policy and explores the potential of soft, hard, and smart power as alternative approaches to resolve the failures of the 60-year-old blockade. The paper analyzes the historical context and rationale behind the embargo and assesses its impact on Cuban-American relations, regional stability, and U.S. national interests. The study argues that the embargo has failed to achieve its intended goals and has instead perpetuated a cycle of hostility, isolation, and human rights abuses. By drawing on the theoretical frameworks of soft, hard, and smart power, the paper presents policy …


The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman Apr 2023

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu Apr 2022

Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu

Theses and Dissertations

Since becoming independent nations in the 60s, West-African countries have enacted laws and regulations with the goals of ensuring peace and justice within their respective borders. On the paper, there was no difference between the justice systems of those newly independent nations and the justice systems of their former masters.

Unfortunately, the rule of law in West-African nations since gaining independence, has not always been followed for a myriad of social, cultural, political, and economic reasons. Most justice systems in West-Africa including in Cote d’Ivoire are deeply corrupted, thus rendering the goal of a peaceful society through a fair justice …


The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe Feb 2022

The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe

Theses and Dissertations

The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such …


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White May 2020

The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White

Chancellor’s Honors Program Projects

No abstract provided.


Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin Jan 2020

Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin

LL.M. Essays & Theses

Specific jurisdiction in civil litigation centers on the rather general,yet immutable, concept of intention. Although the word “intention” does not surface prominently in the personal jurisdiction case law, it is clearly intrinsic to the concept of “purposeful availment”. On the Internet, however, intention is hard to ascertain: how does a court, for example, determine whether the defendant intended that its website, application, or advertisement within a mobile application should end up in the forum state? In answering such a question, courts have historically used one of two approaches to establish intent: (i) a targeting test or (ii) a degree of …


Service-Oriented Foreign Direct Investment: Legal And Policy Frameworks Protecting Digital Assets In Offshoring Information Technology (It) - Enabled Services, Tilahun Mishago Apr 2012

Service-Oriented Foreign Direct Investment: Legal And Policy Frameworks Protecting Digital Assets In Offshoring Information Technology (It) - Enabled Services, Tilahun Mishago

Theses and Dissertations

This thesis examines challenges caused by global cyberspace, which continues to undermine the ability of regulatory instruments aimed at cyber security and deterring cybercrime so that digital assets including those associated with Foreign Direct Investment (FDI) are protected. Progress in information and communication technology (ICT) has brought about both challenges and opportunities for mankind. While ICT has enabled seamless communication on cyberspace, it has also made every phenomenon, positive or negative on cyberspace possible. The good side of ICT is the endless opportunities provided to harness multiple features and capabilities of associated technologies while its side effect being the enormous …