Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

American University Washington College of Law

Journal

Discipline
Keyword
Publication Year
Publication

Articles 1 - 30 of 52

Full-Text Articles in Internet Law

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant Jan 2023

The Need For An Australian Regulatory Code For The Use Of Artificial Intelligence (Ai) In Military Application, Sascha-Dominik Dov Bachmann, Richard V. Grant

American University National Security Law Brief

Artificial Intelligence (AI) is enabling rapid technological innovation and is ever more pervasive, in a global technological eco-system lacking suitable governance and absence of regulation over AI-enabled technologies. Australia is committed to being a global leader in trusted secure and responsible AI and has escalated the development of its own sovereign AI capabilities. Military and Defence organisations have similarly embraced AI, harnessing advantages for applications supporting battlefield autonomy, intelligence analysis, capability planning, operations, training, and autonomous weapons systems. While no regulation exists covering AI-enabled military systems and autonomous weapons, these platforms must comply with International Humanitarian Law, the Law of …


Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski Jan 2023

Hanging In The Balance: An Assessment Of European Versus American Data Privacy Laws And Threats To U.S. National Security, Dara Paleski

American University National Security Law Brief

Social media has quickly become an integral part of modern-day life, keeping the world connected to friends, family and current events. Social media, and the data collected from it, also play a crucial role in intelligence gathering and the safeguarding of national security. It is estimated that about 80-95% of information that is collected for intelligence missions is found freely throughout the internet or other publicly available sources. This type of information has been dubbed SOCMINT (Social Media Intelligence) and it has become a crucial tool within the intelligence community. After the Edward Snowden leaks in 2013 revealed a global …


Shifting Contour Of Data Sharing In Financial Market And Regulatory Responses: The Uk And Australian Models, Han-Wei Liu Jan 2021

Shifting Contour Of Data Sharing In Financial Market And Regulatory Responses: The Uk And Australian Models, Han-Wei Liu

American University Business Law Review

I. INTRODUCTION

Starting from Directive 2015/2366 on Payment Services in the Internal Market — known as PSD II in the European Union (EU) — countries across the world have or are contemplating a new framework to govern data sharing among different players in the financial market. “Open Banking,” as this trend is called, requires or encourages — depending on the regulatory models adopted in different jurisdictions — banks to share consumer-permissioned banking data with third parties securely, in a form that facilitates its use. The Open Banking initiatives have diffused from the EU, and the UK, to elsewhere. The current …


Leveraging Domestic Law Against Cyberattacks, Justin Malzac Jan 2021

Leveraging Domestic Law Against Cyberattacks, Justin Malzac

American University National Security Law Brief

No abstract provided.


Triping On Trade Secrets: How China’S Cybertheft Of U.S. Trade Secrets Violated Trips, Kassidy Schmitz Jan 2021

Triping On Trade Secrets: How China’S Cybertheft Of U.S. Trade Secrets Violated Trips, Kassidy Schmitz

American University International Law Review

No abstract provided.


Self-Defense To Cyber Force: Combatting The Notion Of ‘Scale And Effect', Thomas Eaton Jan 2021

Self-Defense To Cyber Force: Combatting The Notion Of ‘Scale And Effect', Thomas Eaton

American University International Law Review

No abstract provided.


Era Of Accelerating Digital Convergence: Security, Surveillance, Data, Privacy, Big Tech, And Politics, John Taschner Jan 2021

Era Of Accelerating Digital Convergence: Security, Surveillance, Data, Privacy, Big Tech, And Politics, John Taschner

American University International Law Review

No abstract provided.


Cybersecurity And Patent Law - Let's Work Together, Vignesh Ramachandran Feb 2020

Cybersecurity And Patent Law - Let's Work Together, Vignesh Ramachandran

Intellectual Property Brief

No abstract provided.


U.S. Regulation Of Blockchain Currencies: A Policy Overview, Averie Brookes Feb 2020

U.S. Regulation Of Blockchain Currencies: A Policy Overview, Averie Brookes

Intellectual Property Brief

No abstract provided.


How The Digital Millennium Copyright Act Affects Cybersecurity, Katherine Weigle Feb 2020

How The Digital Millennium Copyright Act Affects Cybersecurity, Katherine Weigle

Intellectual Property Brief

No abstract provided.


Technology, The Internet And The Evolution Of Webcasters...Amazon Revisited, Jessica Michelle Ciminero Feb 2020

Technology, The Internet And The Evolution Of Webcasters...Amazon Revisited, Jessica Michelle Ciminero

Intellectual Property Brief

No abstract provided.


What's All The Hype About Hyperlinking?: Connections In Copyright, Dawn Leung Feb 2020

What's All The Hype About Hyperlinking?: Connections In Copyright, Dawn Leung

Intellectual Property Brief

No abstract provided.


Facebook's Speech Code And Policies: How They Suppress Speech And Distort Democratic Deliberation, Joseph T. Thai Jan 2020

Facebook's Speech Code And Policies: How They Suppress Speech And Distort Democratic Deliberation, Joseph T. Thai

American University Law Review

No abstract provided.


Two-Sided Internet Markets And The Need To Assess Both Upstream And Downstream Impacts, Rob Frieden Jan 2019

Two-Sided Internet Markets And The Need To Assess Both Upstream And Downstream Impacts, Rob Frieden

American University Law Review

No abstract provided.


The Dark Data Quandary, Daniel J. Grimm Jan 2019

The Dark Data Quandary, Daniel J. Grimm

American University Law Review

No abstract provided.


Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas Jan 2019

Carpenter V. United States And The Emerging Expectations Of Privacy In Data Comprehensiveness Applied To Browsing History, Daniel De Zayas

American University Law Review

No abstract provided.


Violencia De Género, Internet Y El Derecho A La Libertad De Expresón: Un Nuevo Desafío Para El Derecho Internacional De Los Derechos Humanos, Andrea Pietrafesa Jan 2019

Violencia De Género, Internet Y El Derecho A La Libertad De Expresón: Un Nuevo Desafío Para El Derecho Internacional De Los Derechos Humanos, Andrea Pietrafesa

American University International Law Review

No abstract provided.


The Decline Of Online Piracy: How Markets - Not Enforcement - Drive Down Copyright Infringement, João Pedro Quintais, Joost Poort Jan 2019

The Decline Of Online Piracy: How Markets - Not Enforcement - Drive Down Copyright Infringement, João Pedro Quintais, Joost Poort

American University International Law Review

No abstract provided.


A Search By Any Other Name: Google, Genericism, And Primary Significance, Erica C. Hughes Jan 2018

A Search By Any Other Name: Google, Genericism, And Primary Significance, Erica C. Hughes

American University Business Law Review

No abstract provided.


Insta-Famous: Challenges And Obstacles Facing Bloggers And Social Media Personalities In Defamation Cases, Maureen T. Desimone Jan 2018

Insta-Famous: Challenges And Obstacles Facing Bloggers And Social Media Personalities In Defamation Cases, Maureen T. Desimone

The Modern American

No abstract provided.


Crypto Securities: On The Risks Of Investments In Blockchain-Based Assets And The Dilemmas Of Securities Regulation, Schlomit Azgad-Tromer Jan 2018

Crypto Securities: On The Risks Of Investments In Blockchain-Based Assets And The Dilemmas Of Securities Regulation, Schlomit Azgad-Tromer

American University Law Review

No abstract provided.


Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod Jan 2017

Corporate Directors' And Officers' Cybersecurity Standard Of Care: The Yahoo Data Breach, Lawrence J. Trautman, Peter C. Ormerod

American University Law Review

On September 22, 2016, Yahoo! Inc. ("Yahoo") announced that a data breach and theft of information from over 500 million user accounts had taken place during 2014, marking the largest data breach ever at the time. The information stolen likely included names, birthdays, telephone numbers, email addresses, hashed passwords, and, in some cases, encrypted or unencrypted security questions and answers. Yahoo further disclosed its belief that the stolen data "did not include unprotected passwords, payment card data, or bank account information." Just two months before Yahoo disclosed its 2014 data breach, it announced a proposed sale of the company's core …


Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy Jan 2017

Holding The Fbi Accountable For Hacking Apple's Software Under The Takings Clause, Mark S. Levy

American University Law Review

Smartphones have swiftly replaced most-if not all-conventional methods of sending, receiving, and storing personal information. Letters, address books, calendars, and trips to the bank have been rendered obsolete by tools such as text messaging, digital contacts, iCal, and mobile banking apps. Although these digital alternatives are convenient, they are not immune from attack. Therefore, to remain competitive, technology companies must maintain safe and secure platforms on which users may freely store and share their personal information.

Apple Inc., for example, strives to protect its users' intimate information, consequently earning a reputation for prioritizing security. Like a king protecting his castle, …


Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar Jan 2017

Data Transmission And Energy Efficient Internet Data Centers, Joseph R. Briscar

American University Law Review

The internet is a marvel of human accomplishment and a feat of technological engineering, which allows nearly instantaneous communication across the globe-an act once considered the stuff of science fiction. It has been lauded for its environmental benefits, such as reducing paper production and waste, but, as with any great accomplishment, there are unintended consequences. The increased proliferation of electronic devices to access the internet and the exponential advancement of those devices results in large amounts of electronic waste-a problem in its own right. Compounding the issue, for all of those internet-enabled devices to work, they must rely on the …


Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou Jan 2017

Cybersecurity, Identity Theft, And Standing Law: A Framework For Data Breaches Using Substantial Risk In A Post-Clapper World, James C. Chou

American University National Security Law Brief

No abstract provided.


Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh Jan 2017

Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh

American University Law Review

No abstract provided.


Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones Jan 2017

Little Things And Big Challenges: Information Privacy And The Internet Of Things, Hillary Brill, Scott Jones

American University Law Review

The Internet of Things (loT), the wireless connection of devices to ourselves, each other, and the Internet, has transformed our lives and our society in unimaginable ways. Today, billions of electronic devices and sensors collect, store, and analyze personal information from how fast we drive, to how fast our hearts beat, to how much and what we watch on TV. Even children provide billions of bits of personal information to the cloud through "smart" toys that capture images, recognize voices, and more. The unprecedented and unbridled new information flow generated from the little things of the loT is creating big …


The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard Jan 2016

The Intersection Of "Internet Terrorism" And "Individual Privacy" In The Context Of The First Amendment, Amanda Leonard

American University National Security Law Brief

No abstract provided.


The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan Jan 2016

The Law Of Armed Conflict, Unconventional Warfare, And Cyber Attacks, Thomas P. Jordan

American University National Security Law Brief

No abstract provided.


Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson Jan 2016

Applying The Law Of Neutrality While Transitioning The Seas Of Cyberspace, Danielle Higson

American University National Security Law Brief

No abstract provided.