Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- American University Washington College of Law (2)
- Maurer School of Law: Indiana University (2)
- Northwestern Pritzker School of Law (2)
- Seattle University School of Law (2)
- SelectedWorks (2)
-
- University of San Diego (2)
- Florida A&M University College of Law (1)
- Penn State Dickinson Law (1)
- Pepperdine University (1)
- U.S. Naval War College (1)
- University of Arkansas at Little Rock William H. Bowen School of Law (1)
- University of Colorado Law School (1)
- University of Georgia School of Law (1)
- University of Miami Law School (1)
- University of Michigan Law School (1)
- University of Nebraska - Lincoln (1)
- University of Nevada, Las Vegas -- William S. Boyd School of Law (1)
- University of Richmond (1)
- Vanderbilt University Law School (1)
- Publication Year
- Publication
-
- American University International Law Review (2)
- Northwestern Journal of International Law & Business (2)
- San Diego International Law Journal (2)
- Seattle University Law Review (2)
- Dickinson Law Review (2017-Present) (1)
-
- Federal Communications Law Journal (1)
- Georgia Journal of International & Comparative Law (1)
- Indiana Journal of Global Legal Studies (1)
- International Law Studies (1)
- Jeffrey Li (1)
- Journal Publications (1)
- Journal of the National Association of Administrative Law Judiciary (1)
- Law Faculty Publications (1)
- Library Philosophy and Practice (e-journal) (1)
- Matthew Hoisington (1)
- Michigan Journal of International Law (1)
- Publications (1)
- Scholarly Works (1)
- University of Arkansas at Little Rock Law Review (1)
- University of Miami Inter-American Law Review (1)
- Vanderbilt Journal of Transnational Law (1)
- Publication Type
Articles 1 - 25 of 25
Full-Text Articles in Internet Law
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion
Dickinson Law Review (2017-Present)
No abstract provided.
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman
University of Miami Inter-American Law Review
To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller
International Law Studies
States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …
Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller
Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller
Vanderbilt Journal of Transnational Law
The current legal vacuum regarding binding international norms regulating malicious conduct in cyberspace has paved the way for the emergence of a unilateral tool: cyber sanctions. They have already been introduced by the United States, the European Union, and the United Kingdom. Notwithstanding their obvious importance, their interrelations with international law- especially international economic law-have remained largely unexplored in academic research. This gap is perplexing given the fact that the existing unilateral cyber sanctions have been formulated in such a way as to be prone to misuse. In particular, they bear a significant potential to disrupt economic relations and undermine …
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia
Seattle University Law Review
The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati
Library Philosophy and Practice (e-journal)
Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof
Law Faculty Publications
States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.
This Article draws on tort law and international law principles to construct …
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard
Seattle University Law Review
While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …
Known Unknowns: State Cyber Operations, Cyber Warfare, And The Jus Ad Bellum, Peter Z. Stockburger
Known Unknowns: State Cyber Operations, Cyber Warfare, And The Jus Ad Bellum, Peter Z. Stockburger
American University International Law Review
No abstract provided.
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
International Cyberspace: From Borderless To Balkanized???, Beverley Earle, Gerald A. Madek
Georgia Journal of International & Comparative Law
No abstract provided.
Internet Control Or Internet Censorship? Comparing The Control Models Of China, Singapore, And The United States To Guide Taiwan’S Choice, Jeffrey Li
Jeffrey Li
Internet censorship generally refers to unjustified online speech scrutiny and control by the government or government-approved measures for Internet control. The danger of Internet censorship is the chilling effect and the substantial harm on free speech, a cornerstone of democracy, in cyberspace. This paper compares China’s blocking and filtering system, the class license system of Singapore, and the government-private partnership model of the United States to identify the features, and pros and cons of each model on the international human rights. By finding lessons from each of the model, this paper suggests Taiwan should remain its current meager internet control …
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev
San Diego International Law Journal
The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza
University of Arkansas at Little Rock Law Review
A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.
After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …
Cybercrime, Ronald C. Griffin
Cybercrime, Ronald C. Griffin
Journal Publications
This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble
Scholarly Works
Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Cyberwarfare And The Use Of Force Giving Rise To The Right Of Self-Defense, Matthew Hoisington
Matthew Hoisington
Cyberwarfare represents a novel weapon that has the potential to alter the way state and non-state actors conduct modern war. The unique nature of the threat and the ability for cyberwar practioners to inflict injury, death, and physical destruction via cyberspace strains traditional definitions of the use of force. In order to clearly delineate the rights of the parties involved, including the right to self-defense, the international community must come to some consensus on the meaning of cyberwarfare within the existing jus ad bellum paradigm. After examining the shortcomings inherent in classifying cyberattacks according to classical notions of kinetic warfare, …
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
States, Markets, And Gatekeepers: Public-Private Regulatory Regimes In An Era Of Economic Globalization, Christopher M. Bruner
Michigan Journal of International Law
This Article illuminates the spectrum of international economic regimes through discussion of an under-theorized regulatory structure in which traditional distinctions between State and market, public and private power, hard and soft law, and international and domestic policy realms, essentially collapse-the "public-private gatekeeper."
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Today's Indian Wars: Between Cyberspace And The United Nations, S. James Anaya
Publications
No abstract provided.
From St. Ives To Cyberspace: The Modern Distortion Of The Medieval 'Law Merchant', Stephen E. Sachs
From St. Ives To Cyberspace: The Modern Distortion Of The Medieval 'Law Merchant', Stephen E. Sachs
American University International Law Review
No abstract provided.
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
Using Architectural Constraints And Game Theory To Regulate International Cyberspace Behavior, Van N. Nguy
San Diego International Law Journal
The debate over whether cyberspace can or should be regulated is essentially dead. This is the conclusion being taught in law schools today. The battle between Judge Frank Easterbrook and Professor Lawrence Lessig over "laws" and "horses", infamous among cyberspace legal scholars, became irrelevant when geographically-based governments began regulating Internet related activities. However, debate over how the Internet should be regulated continues. One way of framing this debate is in terms of deciding how to regulate behavior in cyberspace. Professor Lessig postulated four kinds of constraints regulate behavior: (1) social norms, (2) markets, (3) law, and (4) architecture. This comment …
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
How Far Have We Come, And Where Do We Go From Here: The Status Of Global Computer Software Protection Under The Trips Agreement, Aaron D. Charfoos
Northwestern Journal of International Law & Business
The TRIPS agreement made significant advances over the pre-TRIPS international regime with respect to the protection of computer software. There are at least two significant advances. First, computer software protections have been embedded into the new dispute resolution procedures. Second, both object and source code are protected under the copyright sections of the Agreement. The dispute resolution procedures provide back-end protection (protection after offenses have occurred), while new copyright provisions provide affirmative front-end protection (protection deterring such offenses). However, the Agreement could have, and should have, gone farther to protect the software industry. By not formally deciding on the ability …
Internet Jurisdiction Today, Adria Allen
Internet Jurisdiction Today, Adria Allen
Northwestern Journal of International Law & Business
This paper will use the Yahoo case to illustrate the unique jurisdictional dilemma posed by the Internet as countries try to enforce their laws in an era when laws may be broken, through the use of the Internet, from other countries with conflicting laws.' Part I of this paper will address the Yahoo case and its importance to Internet jurisdiction. Part II will explore traditional jurisdiction and apply it to the Yahoo case. Part III will identify twopotential theories of Internet jurisdiction and investigate whether they are feasible solutions to the problem posed by the Yahoo case. Part IV will …
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Cyberspace, Sovereignty, Jurisdiction, And Modernism, Joel Trachtman
Indiana Journal of Global Legal Studies
No abstract provided.
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
International Jurisdiction In Cyberspace: Which States May Regulate The Internet?, Stephan Wilske, Teresa Schiller
Federal Communications Law Journal
The Internet now reaches 60 million users in 160 countries, with the number increasing each year. Although cyberspace has been viewed as a self-regulating entity controlled by no government, this myth is being destroyed as the global Internet community expands. With this expansion comes a question: Who has the authority to regulate cyberspace? Given that decisions about the Internet reach far beyond national borders, the answer to this question is unknown, but certainly has broad implications. Traditional laws of international jurisdiction, including jurisdiction to prescribe, jurisdiction to adjudicate, and jurisdiction to enforce, offer some clear answers. However, further development of …