Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Computer Law (15)
- Law and Society (14)
- National Security Law (14)
- Business (13)
- Public Affairs, Public Policy and Public Administration (13)
-
- Social and Behavioral Sciences (13)
- Criminology (12)
- Engineering (12)
- Sociology (12)
- Technology and Innovation (12)
- Computer Sciences (11)
- Other Engineering (11)
- Physical Sciences and Mathematics (11)
- Public Policy (11)
- Science and Technology Studies (11)
- Social Policy (11)
- Science and Technology Law (8)
- Constitutional Law (7)
- Communications Law (6)
- Privacy Law (6)
- First Amendment (4)
- Intellectual Property Law (4)
- International Law (4)
- Legislation (4)
- Administrative Law (3)
- Criminal Law (3)
- Law and Economics (3)
- Military, War, and Peace (3)
- Institution
- Publication Year
- Publication
-
- Professor Katina Michael (6)
- Indiana Law Journal (4)
- Lawrence J. Trautman Sr. (4)
- Associate Professor Katina Michael (3)
- Federal Communications Law Journal (3)
-
- Catholic University Journal of Law and Technology (2)
- Alexander Hayes Mr. (1)
- Articles, Book Chapters, & Popular Press (1)
- David Barnhizer (1)
- Dr. Mutaz M. Al-Debei (1)
- Joint PIJIP/TLS Research Paper Series (1)
- Journal of Business & Technology Law (1)
- Margaret Hu (1)
- Theses and Dissertations (Comprehensive) (1)
- University of Miami Inter-American Law Review (1)
- Publication Type
- File Type
Articles 31 - 31 of 31
Full-Text Articles in Internet Law
Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors
Encryption Regulation In The Wake Of September 11, 2001: Must We Protect National Security At The Expense Of The Economy?, Matthew Parker Voors
Federal Communications Law Journal
This Note argues that although privacy and economic concerns have ruled the encryption debate during the past decade, the move toward increased privacy on the Internet and relaxed encryption regulation, designed to promote electronic commerce, comes at the expense of national security and the protection of Americans' safety. The Article begins with historical information about encryption and an examination of how businesses use encryption to secure their communications and financial transactions on the Internet. This Section also observes that this technology is employed by terrorist organizations to accomplish the same goal: to send private communications. The Author next details the …