Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Cyberspace

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 100

Full-Text Articles in Internet Law

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang Apr 2023

Who Owns Data? Constitutional Division In Cyberspace, Dongsheng Zang

Articles

Privacy emerged as a concern as soon as the internet became commercial. In early 1995, Lawrence Lessig warned that the internet, though giving us extraordinary potential, was “not designed to protect individuals against this extraordinary potential for others to abuse.” The same technology can “destroy the very essence of what now defines individuality.” Lessig urged that “a constitutional balance will have to be drawn between these increasingly important interests in privacy, and the competing interest in collective security.” Lessig envisioned that creating property rights in data would help individuals by giving them control of their data. As utopian as property …


Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan Jan 2023

Book Review Rethinking The Jurisprudence Of Cyberspace, David Cowan

Canadian Journal of Law and Technology

It is a common claim that law is always catching up with technology. This is not entirely fair. The European Union’s General Data Protection Regulation1 (GDPR) could be viewed as a case of technology having to catch up to the law. That said, clearly there are challenges in law and in the legal profession, both in terms of how the law can adapt to changes in the digital world and the disruption of the legal profession. On the former point, there are perhaps three broad schools of thought: existing law is sufficient for adapting to new technological challenges, as it …


Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius Oct 2022

Anonymous Hacktivism: Flying The Flag Of Feminist Ethics For The Ukraine It Army, Ellen Cornelius

Homeland Security Publications

No abstract provided.


“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain Jan 2022

“The Virus Of Liberty”: John Perry Barlow, Internet Law, And Grateful Dead Studies, Joseph A. Tomain

Articles by Maurer Faculty

In 2019, the Duke Law and Technology Review published a special issue titled, "The Past and Future of the Internet: A Symposium for John Perry Barlow." This essay examines the legal scholarship in the Barlow symposium and frames it in the interdisciplinary terms of Grateful Dead studies. Part I focuses on the two Barlow essays that formed the basis of the symposium. Part II connects issues raised by the Barlow symposium to Grateful Dead studies. The essay concludes that Barlow's legacy should inspire others to engage both the cultural and political paths with “groundless hope,” because protecting the “inexplicable pleasures …


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman Dec 2021

Defend Forward & Sovereignty: How America’S Cyberwar Strategy Upholds International Law, Elya Taichman

University of Miami Inter-American Law Review

To thwart a seemingly neve rending bombardment of cyberattacks, the U.S. Department of Defense recently implemented a new strategy – defending forward. This approach demands persistently engaging the enemy on a daily basis to disrupt cyber activity. Rather than waiting to be attacked, the United States is bringing the fight to the enemy. However, this strategy poses fascinating and complex questions of international law. In particular, because most defend forward operations fall within the gray zone of warfare, it remains unclear whether these operations violate the sovereignty of American adversaries or even third party nation states in whose cyberspace U.S. …


In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller Oct 2021

In Defense Of Pure Sovereignty In Cyberspace, Kevin Jon Heller

International Law Studies

States currently endorse three different positions concerning the international wrongfulness of cyber operations that penetrate computer systems located on the territory of another state but do not rise to the level of a use of force or prohibited intervention. The first position is that such low-intensity cyber operations are never wrongful, because sovereignty is a principle of international law, not a primary rule that can be independently violated. The second is that low-intensity cyber operations are always wrongful, because sovereignty is a primary rule of international law that is violated by any non-consensual penetration of a computer system located on …


Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller Oct 2021

Unilateral Cyber Sanctions: Between Questioned Legality And Normative Value, Iryna Bogdanova, Maria Vasquez Callo-Muller

Vanderbilt Journal of Transnational Law

The current legal vacuum regarding binding international norms regulating malicious conduct in cyberspace has paved the way for the emergence of a unilateral tool: cyber sanctions. They have already been introduced by the United States, the European Union, and the United Kingdom. Notwithstanding their obvious importance, their interrelations with international law- especially international economic law-have remained largely unexplored in academic research. This gap is perplexing given the fact that the existing unilateral cyber sanctions have been formulated in such a way as to be prone to misuse. In particular, they bear a significant potential to disrupt economic relations and undermine …


Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder Aug 2019

Dancing On The Grave Of Copyright?, Anupam Chander, Madhavi Sunder

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow, James Boyle

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Independence Of Cyberspace, John Perry Barlow Aug 2019

A Declaration Of The Independence Of Cyberspace, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow Aug 2019

Selling Wine Without Bottles: The Economy Of Mind On The Global Net, John Perry Barlow

Duke Law & Technology Review

No abstract provided.


A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson Aug 2019

A Declaration Of The Mission Of University In Barlowspace, Charles R. Nesson

Duke Law & Technology Review

No abstract provided.


The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto Aug 2019

The Enigma Of Digitized Property A Tribute To John Perry Barlow, Pamela Samuelson, Kathryn Hashimoto

Duke Law & Technology Review

No abstract provided.


What Didn’T Happen: An Essay In Speculation, Peter Jaszi Aug 2019

What Didn’T Happen: An Essay In Speculation, Peter Jaszi

Duke Law & Technology Review

No abstract provided.


The Past And Future Of The Internet: A Symposium For John Perry Barlow Aug 2019

The Past And Future Of The Internet: A Symposium For John Perry Barlow

Duke Law & Technology Review

No abstract provided.


Defining Critical Infrastructure For A Global Application, Colleen M. Newbill Aug 2019

Defining Critical Infrastructure For A Global Application, Colleen M. Newbill

Indiana Journal of Global Legal Studies

A Google search for the phrase "critical infrastructure" turns up 189 million results in little more than a half second: ''global critical infrastructure" has 151 million results; and "definition of critical infrastructure" yields 71.5 million results. The list of what industries and sectors fall under the critical infrastructure designation expands as time progresses and technology develops. As the threat of cyberattacks increases and this frontier of terrorism continues to emerge, attacks on critical infrastructure are high on the list of concerns and the need for protective measures imperative. The focus on protecting critical infrastructure does not stop at the borders …


Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii Jun 2019

Different Problems Require Different Solutions: How Air Warfare Norms Should Inform Ihl Targeting Law Reform & Cyber Warfare, Christian H. Robertson Ii

University of Michigan Journal of Law Reform

On February 19, 2018, United Nations Secretary-General Antonio Guterres claimed that he was “absolutely convinced” that “the next war will begin with a massive cyber-attack to destroy military capacity . . . and paralyze basic infrastructure.” The Secretary-General’s greatest concern, however, is that he believes “there is no regulatory scheme for that type of warfare, it is not clear how the Geneva Convention or international humanitarian law applies to it.” Although Additional Protocol I to the Geneva Conventions (AP I) targeting laws generally identify who and what States may target in war, it expressly limits itself to attacks affecting people …


Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia Apr 2019

Requiem For Cyberspace: The Effect Of The European General Privacy Regulation On The Global Internet, Steven Tapia

Seattle University Law Review

The dream of a perpetual, limitless, non-dimensional space is an idea that has transfixed clergy, philosophers, and poets for ages. Whether it is called “heaven,” “the afterlife,” “nirvana,” or another linguistic stand-in, the dream of a dimension beyond the bounds of time, space, and the laws of nature seems as universal as any concept ever. From its initial development in the 1970s (as a military, academic, and governmental experiment in creating a wholly alternative means of communication capable of surviving catastrophic failures of any parts of the communications conduits) until essentially now, the Internet seemed to be the closest incarnate …


Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton Jan 2019

Everything Old Is New Again: Does The '.Sucks' Gtld Change The Regulatory Paradigm In North America?, Jacqueline D. Lipton

Articles

In 2012, the Internet Corporation for Assigned Names and Numbers (“ICANN”) took the unprecedented step of opening up the generic Top Level Domain (“gTLD”) space for entities who wanted to run registries for any new alphanumeric string “to the right of the dot” in a domain name. After a number of years of vetting applications, the first round of new gTLDs was released in 2013, and those gTLDs began to come online shortly thereafter. One of the more contentious of these gTLDs was “.sucks” which came online in 2015. The original application for the “.sucks” registry was somewhat contentious with …


Territorialization Of The Internet Domain Name System, Marketa Trimble Sep 2018

Territorialization Of The Internet Domain Name System, Marketa Trimble

Pepperdine Law Review

Territorialization of the internet—the linking of the internet to physical geography—is a growing trend. Internet users have become accustomed to the conveniences of localized advertising, have enjoyed location-based services, and have witnessed an increasing use of geolocation and geoblocking tools by service and content providers who—for various reasons— either allow or block access to internet content based on users’ physical locations. This article analyzes whether, and if so how, the trend toward territorialization has affected the internet Domain Name System (DNS). As a hallmark of cyberspace governance that aimed to be detached from the territorially-partitioned governance of the physical world, …


The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati Aug 2018

The Effect Of Globalization On The National Criminal Law Systems, Shirin Ahmadi Dastjerdi, Abbas Sheikholeslami, Haniyeh Hojabrosadati

Library Philosophy and Practice (e-journal)

Globalization has influenced many human life scopes with a variety of tools, which the cyberspace playing the most role. Although both cyberspace and globalization have had many benefits to human life, both as a tool and as a process, they have been able to assist offenders to bring crime into the cyberspace without any trouble. Therefore, today criminologists discuss the globalized world of crime. Although, the processes of homogenization and globalization have been precious to human beings, should not be overlooked. In this article, the author has tried to explain the cybercrime in the age of globalization, with an emphasis …


Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg Apr 2018

Humans Forget, Machines Remember: Artificial Intelligence And The Right To Be Forgotten, Tiffany Li, Eduard Fosch Villaronga, Peter Kieseberg

Faculty Scholarship

To understand the Right to be Forgotten in context of artificial intelligence, it is necessary to first delve into an overview of the concepts of human and AI memory and forgetting. Our current law appears to treat human and machine memory alike – supporting a fictitious understanding of memory and forgetting that does not comport with reality. (Some authors have already highlighted the concerns on the perfect remembering.) This Article will examine the problem of AI memory and the Right to be Forgotten, using this example as a model for understanding the failures of current privacy law to reflect the …


International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof Jan 2018

International Cybertorts: Expanding State Accountability In Cyberspace, Rebecca Crootof

Law Faculty Publications

States are not being held accountable for the vast majority of their harmful cyberoperations, largely because classifications created in physical space do not map well onto the cyber domain. Most injurious and invasive cyberoperations are not cybercrimes and do not constitute cyberwarfare, nor are states extending existing definitions of wrongful acts permitting countermeasures to cyberoperations (possibly to avoid creating precedent restricting their own activities). Absent an appropriate label, victim states have few effective and nonescalatory responsive options, and the harms associated with these incidents lie where they fall.

This Article draws on tort law and international law principles to construct …


The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson Aug 2017

The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson

Oklahoma Journal of Law and Technology

No abstract provided.


Interpretation Catalysts In Cyberspace, Rebecca Ingber Jun 2017

Interpretation Catalysts In Cyberspace, Rebecca Ingber

Faculty Scholarship

The cybersphere offers a rich space from which to explore the development of international law in a compressed time frame. This piece examines the soft law process over the last decade of the two Tallinn Manuals – handbooks on the international law of cyber warfare and cyber operations – as a valuable lens through which to witness the effects of “interpretation catalysts” on the evolution of international law. In prior work, I identified the concept of interpretation catalysts – discrete triggers for legal interpretation – and their influence on the path that legal evolution takes, including by compelling a decision-making …


War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste Jan 2017

War In The Expanse: The Metaphysics Of Cyberspace, Roy Balleste

Canadian Journal of Law and Technology

No abstract provided.


A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard Oct 2016

A Brave New Borderless World: Standardization Would End Decades Of Inconsistency In Determining Proper Personal Jurisdiction In Cyberspace Cases, Jonathan Spencer Barnard

Seattle University Law Review

While various courts and numerous legal professionals have addressed the issue of inconsistent application of personal jurisdiction in cyberspace cases, the Supreme Court has yet to discuss the impact that technology might have on the analysis of personal jurisdiction; thus, many details remain unresolved. This Note examines the varying jurisdictional splits between the lower district courts, the courts of appeals, and the federal circuit court of appeals in determining the proper approach to take when dealing with Internet jurisdiction. After an examination of several key cases, this Note will explain why the Supreme Court, or the Legislature, should adopt an …


Public Forum 2.0, Lyrissa Barnett Lidsky Apr 2016

Public Forum 2.0, Lyrissa Barnett Lidsky

Lyrissa Barnett Lidsky

Social media have the potential to revolutionize discourse between American citizens and their governments. At present, however, the U.S. Supreme Court's public forum jurisprudence frustrates rather than fosters that potential. This article navigates the notoriously complex body of public forum doctrine to provide guidance for those who must develop or administer government-sponsored social media or adjudicate First Amendment questions concerning them. Next, the article marks out a new path for public forum doctrine that will allow it to realize the potential of Web 2.0 technologies to enhance democratic discourse between the governors and the governed. Along the way, this article …


Known Unknowns: State Cyber Operations, Cyber Warfare, And The Jus Ad Bellum, Peter Z. Stockburger Jan 2016

Known Unknowns: State Cyber Operations, Cyber Warfare, And The Jus Ad Bellum, Peter Z. Stockburger

American University International Law Review

No abstract provided.