Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Big data (1)
- Binary test (1)
- CDNs (1)
- Canada (1)
- Content delivery networks (1)
-
- Criminology (1)
- Cuba (1)
- Customs of War (1)
- Cyber Combat (1)
- Cyber-Warfare (1)
- Cybercrime (1)
- Cybercrime prevention (1)
- Cybersecurity (1)
- Cyber–Ordnance (1)
- Cyber–Space (1)
- Data policy (1)
- Data privacy (1)
- Data protection (1)
- Due process (1)
- Efficacy (1)
- Electronic commerce security measures (1)
- Embargo (1)
- Foreign direct invesments (1)
- GDPR (1)
- Havannah club (1)
- Hybrid Warfare (1)
- Intention (1)
- International Cybercrime (1)
- International Humanitarian Law (1)
- International trade (1)
Articles 1 - 8 of 8
Full-Text Articles in Internet Law
Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse
Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse
Major Papers
This major paper examines the Cuban embargo as an ineffective hard power policy and explores the potential of soft, hard, and smart power as alternative approaches to resolve the failures of the 60-year-old blockade. The paper analyzes the historical context and rationale behind the embargo and assesses its impact on Cuban-American relations, regional stability, and U.S. national interests. The study argues that the embargo has failed to achieve its intended goals and has instead perpetuated a cycle of hostility, isolation, and human rights abuses. By drawing on the theoretical frameworks of soft, hard, and smart power, the paper presents policy …
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman
Doctoral Dissertations and Master's Theses
This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …
Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu
Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu
Theses and Dissertations
Since becoming independent nations in the 60s, West-African countries have enacted laws and regulations with the goals of ensuring peace and justice within their respective borders. On the paper, there was no difference between the justice systems of those newly independent nations and the justice systems of their former masters.
Unfortunately, the rule of law in West-African nations since gaining independence, has not always been followed for a myriad of social, cultural, political, and economic reasons. Most justice systems in West-Africa including in Cote d’Ivoire are deeply corrupted, thus rendering the goal of a peaceful society through a fair justice …
The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe
The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe
Theses and Dissertations
The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such …
Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight
Theses and Dissertations (Comprehensive)
In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …
The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White
The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White
Chancellor’s Honors Program Projects
No abstract provided.
Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin
Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin
LL.M. Essays & Theses
Specific jurisdiction in civil litigation centers on the rather general,yet immutable, concept of intention. Although the word “intention” does not surface prominently in the personal jurisdiction case law, it is clearly intrinsic to the concept of “purposeful availment”. On the Internet, however, intention is hard to ascertain: how does a court, for example, determine whether the defendant intended that its website, application, or advertisement within a mobile application should end up in the forum state? In answering such a question, courts have historically used one of two approaches to establish intent: (i) a targeting test or (ii) a degree of …
Service-Oriented Foreign Direct Investment: Legal And Policy Frameworks Protecting Digital Assets In Offshoring Information Technology (It) - Enabled Services, Tilahun Mishago
Theses and Dissertations
This thesis examines challenges caused by global cyberspace, which continues to undermine the ability of regulatory instruments aimed at cyber security and deterring cybercrime so that digital assets including those associated with Foreign Direct Investment (FDI) are protected. Progress in information and communication technology (ICT) has brought about both challenges and opportunities for mankind. While ICT has enabled seamless communication on cyberspace, it has also made every phenomenon, positive or negative on cyberspace possible. The good side of ICT is the endless opportunities provided to harness multiple features and capabilities of associated technologies while its side effect being the enormous …