Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (48)
- Maurer School of Law: Indiana University (6)
- Selected Works (3)
- William & Mary Law School (3)
- Chicago-Kent College of Law (2)
-
- University of Pennsylvania Carey Law School (2)
- City University of New York (CUNY) (1)
- La Salle University (1)
- Olivet Nazarene University (1)
- Southern Methodist University (1)
- The Catholic University of America, Columbus School of Law (1)
- The University of Maine (1)
- University of Arkansas, Fayetteville (1)
- University of Kentucky (1)
- University of Nebraska Medical Center (1)
- University of South Florida (1)
- Virginia Commonwealth University (1)
- Keyword
-
- Data protection (4)
- Law (4)
- Artificial intelligence (3)
- Blockchain (3)
- Cybersecurity (3)
-
- Technology (3)
- Apportionment (2)
- Bitcoin (2)
- Digital forensics (2)
- Election Districts (2)
- Election Law (2)
- Gerrymandering (2)
- Network security (2)
- Privacy (2)
- Privacy law (2)
- Security (2)
- Tactful inattention paradigm (2)
- 3D printing (1)
- AR Drone 2.0. (1)
- Affairs (1)
- Algorithms (1)
- Application development (1)
- Approximate matching (1)
- Artificial Intelligence (1)
- Automated licensing (1)
- Automation (1)
- Big Data (1)
- Big forensic data (1)
- Characterization (1)
- Cloud architecture (1)
- Publication
-
- Journal of Digital Forensics, Security and Law (33)
- Annual ADFSL Conference on Digital Forensics, Security and Law (15)
- Articles by Maurer Faculty (5)
- All Faculty Scholarship (4)
- Arkansas Law Review (1)
-
- Books & Book Chapters by Maurer Faculty (1)
- Capstone Experience (1)
- Catholic University Journal of Law and Technology (1)
- Daniel J Gervais (1)
- Electronic Theses and Dissertations (1)
- Elizabeth De Armond (1)
- Faculty Publications (1)
- MPA/MPP/MPFM Capstone Projects (1)
- Mathematics and Computer Science Capstones (1)
- Numeracy (1)
- SMU Data Science Review (1)
- Stephen E Henderson (1)
- Student Scholarship – Computer Science (1)
- Student Theses (1)
- Theses and Dissertations (1)
- William & Mary Law Review (1)
- William & Mary Law Review Online (1)
Articles 61 - 75 of 75
Full-Text Articles in Computer Sciences
Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall
Models As Weapons: Review Of Weapons Of Math Destruction: How Big Data Increases Inequality And Threatens Democracy By Cathy O’Neil (2016), Samuel L. Tunstall
Numeracy
Cathy O’Neil. 2016. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy (New York, NY: Crown) 272 pp. ISBN 978-0553418811.
Accessible to a wide readership, Cathy O’Neil’s Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy provides a lucid yet alarming account of the extensive reach of mathematical models in influencing all of our lives. With a particular eye towards social justice, O’Neil not only warns modelers to be cognizant of the effects of their work on real people—especially vulnerable groups who have less power to fight back—but also encourages laypersons to take initiative …
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Cyber Law And Espionage Law As Communicating Vessels, Asaf Lubin
Books & Book Chapters by Maurer Faculty
Professor Lubin's contribution is "Cyber Law and Espionage Law as Communicating Vessels," pp. 203-225.
Existing legal literature would have us assume that espionage operations and “below-the-threshold” cyber operations are doctrinally distinct. Whereas one is subject to the scant, amorphous, and under-developed legal framework of espionage law, the other is subject to an emerging, ever-evolving body of legal rules, known cumulatively as cyber law. This dichotomy, however, is erroneous and misleading. In practice, espionage and cyber law function as communicating vessels, and so are better conceived as two elements of a complex system, Information Warfare (IW). This paper therefore first draws …
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
All Faculty Scholarship
No abstract provided.
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
How Much Should We Spend To Protect Privacy?: Data Breaches And The Need For Information We Do Not Have, Richard Warner, Robert Sloan
All Faculty Scholarship
A cost/benefit approach to privacy confronts two tradeoff issues. One is making appropriate tradeoffs between privacy and many goals served by the collection, distribution, and use of information. The other is making tradeoffs between investments in preventing unauthorized access to information and the variety of other goals that also make money, time, and effort demands. Much has been written about the first tradeoff. We focus on the second. The issue is critical. Data breaches occur at the rate of over three a day, and the aggregate social cost is extremely high. The puzzle is that security experts have long explained …
Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang
Determinants Of Personal Information Protection Activities In South Korea, Pilku Kang
MPA/MPP/MPFM Capstone Projects
The purpose of this paper is to investigate how people’s awareness and ways to obtain relevant materials of personal information have influenced individual’s information privacy protection activities. This study uses the data of a 2016 survey on information security published by Korea Information and Security Agency.
The dependent variables of this study are preventive measures for the security of a Personal Computer (PC) and preventive measures against personal information breach. I classify independent variables into four types. They are internet users’ perception about information privacy, such as awareness of the importance of protecting one’s personal information, and awareness of information …
Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain
Providing Protection To Programmers' Works: Disregard The Merger Doctrine And Adopt The Application Approach, Akshay Jain
Catholic University Journal of Law and Technology
In today’s technological landscape, computer programs are one of the most highly complex and popular inventions. However, they still receive little or sometimes no legal protection. As a consequence, programmers are reluctant to create new programs, discouraging innovation and preventing the public to benefit from using these inventions. If the court does afford them copyright protection, they may still not receive legal damages for copyright infringement because the court would not consider their program registered under the Copyright Act of 1976.
This Comment argues for greater copyright protection for programs by disregarding the merger doctrine, which does not provide protection …
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Expanding The Artificial Intelligence-Data Protection Debate, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Cybersecurity And The New Era Of Space Activities, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Securing The Internet Of Healthcare, Michael Mattioli, Scott J. Shackelford, Steve Myers, Austin Brady, Yvette Wang, Stephanie Wong
Articles by Maurer Faculty
Cybersecurity, including the security of information technology (IT), is a critical requirement in ensuring society trusts, and therefore can benefit from, modern technology. Problematically, though, rarely a day goes by without a news story related to how critical data has been exposed, exfiltrated, or otherwise inappropriately used or accessed as a result of supply chain vulnerabilities. From the Russian government's campaign to influence the 2016 U.S. presidential election to the September 2017 Equifax breach of more than 140-million Americans' credit reports, mitigating cyber risk has become a topic of conversation in boardrooms and the White House, on Wall Street and …
The New Writs Of Assistance, Ian Samuel
The New Writs Of Assistance, Ian Samuel
Articles by Maurer Faculty
The providers of network services (and the makers of network devices) know an enormous amount about our lives. Because they do, these network intermediaries are being asked with increasing frequency to assist the government in solving crimes or gathering intelligence. Given how much they know about us, if the government can secure the assistance of these intermediaries, it will enjoy a huge increase in its theoretical capacity for surveillance—the ability to learn, in principle, almost anything about anyone. That has the potential to create serious social harm, even assuming that the government continues to adhere to ordinary democratic norms and …
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
An Unstoppable Force And An Immoveable Object? Eu Data Protection Law And National Security, Fred H. Cate, Christopher Kuner, Orla Lynskey, Christopher Millard, Nora Ni Loideain, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Consuming Digital Debris In The Plasticene, Stephen R. Parks
Theses and Dissertations
Claims of customization and control by socio-technical industries are altering the role of consumer and producer. These narratives are often misleading attempts to engage consumers with new forms of technology. By addressing capitalist intent, material, and the reproduction limits of 3-D printed objects’, I observe the aspirational promise of becoming a producer of my own belongings through new networks of production. I am interested in gaining a better understanding of the data consumed that perpetuates hyper-consumptive tendencies for new technological apparatuses. My role as a designer focuses on the resolution of not only the surface of the object through 3-D …
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Artificial Intelligence And Role-Reversible Judgment, Stephen E. Henderson, Kiel Brennan-Marquez
Stephen E Henderson
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Blockchain And Smart Contracts: The Missing Link In Copyright Licensing?, Balazs Bodo, Daniel Gervais, Joao Pedro Quintais
Daniel J Gervais
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Tactful Inattention: Erving Goffman, Privacy In The Digital Age, And The Virtue Of Averting One's Eyes, Elizabeth De Armond
Elizabeth De Armond
No abstract provided.