Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Internet Law

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev Nov 2012

Cyberterrorism In The Context Of Contemporary International Law, Yaroslav Shiryaev

San Diego International Law Journal

The present Article addressed the legal issues surrounding cyberterrorism. In the first chapter, the author explains why cyberterrorism should be described as “the use of electronic networks taking the form of a cyber-attack to commit a) a substantive act criminalized by the existing legal instruments prohibiting terrorism, or b) an act of terrorism under international customary law.” Further, with a special emphasis on existing anti-terrorism conventions and customary international law, it was demonstrated which actors are likely to engage in acts of cyberterrorism (non-state actors, corporations and individuals), as well as which targets are protected by law and which aims …


Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza Jul 2012

Walled Gardens Of Privacy Or “Binding Corporate Rules?”: A Critical Look At International Protection Of Online Privacy, Joanna Kulesza

University of Arkansas at Little Rock Law Review

A growing concern in the era of cloud computing is protecting Internet users' privacy. This concern is compounded by the fact that there are no effective international solutions. This article considers the latest European Union (EU) proposed development in this area – a regulatory model based on amended Binding Corporate Rules (BCR) – as introduced by the EU Justice Commissioner. These planned changes would have worldwide effects on international companies' online activities in transboundary cyberspace.

After providing a background on the concept of defining privacy in general, the article describes the BCR proposal, and proceeds to consider the likelihood of …


Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik Jan 2012

Customary Internet-Ional Law: Creating A Body Of Customary Law For Cyberspace, Kam Wai, Warren Bartholomew Chik

Warren Bartholomew Chik

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik Jan 2012

Harassment Through Digital Media: A Cross-Jurisdictional Comparative Analysis On The Law On Cyberstalking, Warren B. Chik

Warren Bartholomew Chik

The cyber world is an extension of the real world. It is another dimension where we can work, study and play. But people also tend to lose their inhibitions on the Internet, often while keeping their anonymity. Because of the perceived and real freedoms in the digital environment, people are emboldened to act in ways that they may not normally do in the real world. One recent phenomenon that is steadily becoming a problem in every country with a high level of electronic connectivity is the act of cyberstalking. The electronic medium is an important factor due to its very …


'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik Jan 2012

'Customary Internet-Ional Law': Creating A Body Of Customary Law For Cyberspace. Part 1: Developing Rules For Transitioning Custom Into Law, Warren B. Chik

Warren Bartholomew CHIK

The shift in socio-economic transactions from realspace to cyberspace through the emergence of electronic communications and digital formats has led to a disjuncture between the law and practices relating to electronic transactions. The speed at which information technology has developed require a faster, more reactive and automatic response from the law that is not currently met by the existing law-making framework. This paper suggests the development of special rules to enable Internet custom to form legal norms to fulfill this objective. In Part 1, I will describe the socio-economic problems and stresses that electronic transactions place on existing policy and …


The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble Jan 2012

The Future Of Cybertravel: Legal Implications Of The Evasion Of Geolocation, Marketa Trimble

Scholarly Works

Although the Internet is valued by many of its supporters particularly because it both defies and defeats physical borders, these important attributes are now being exposed to attempts by both governments and private entities to impose territorial limits through blocking or permitting access to content by Internet users based on their geographical location—a territorial partitioning of the Internet. One of these attempts, for example, is the recent Stop Online Piracy Act (“SOPA”) proposal in the United States. This article, as opposed to earlier literature on the topic discussing the possible virtues and methods of erecting borders in cyberspace, focuses on …


Cybercrime, Ronald C. Griffin Jan 2012

Cybercrime, Ronald C. Griffin

Journal Publications

This essay recounts campaigns against privacy; the fortifications erected against them; and hi-jinx attributable to hackers, crackers, and miscreants under the Fair Credit Reporting Act.