Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

2900 Full-Text Articles 2570 Authors 992826 Downloads 75 Institutions

All Articles in Computer Law

Faceted Search

2900 full-text articles. Page 1 of 69.

Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty 2016 Duke Law

Icrc, Nato And The U.S. – Direct Participation In Hacktivities – Targeting Private Contractors And Civilians In Cyberspace Under International Humanitarian Law, Ido Kilovaty

Duke Law & Technology Review

Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from ...


I Think, Therefore I Invent: Creative Computers And The Future Of Patent Law, Ryan Abbott 2016 University of Surrey School of Law

I Think, Therefore I Invent: Creative Computers And The Future Of Patent Law, Ryan Abbott

Boston College Law Review

Artificial intelligence has been generating inventive output for decades, and now the continued and exponential growth in computing power is poised to take creative machines from novelties to major drivers of economic growth. In some cases, a computer’s output constitutes patentable subject matter, and the computer rather than a person meets the requirements for inventorship. Despite this, and despite the fact that the Patent Office has already granted patents for inventions by computers, the issue of computer inventorship has never been explicitly considered by the courts, Congress, or the Patent Office. Drawing on dynamic principles of statutory interpretation and ...


A Second Bite At The Apple: Federal Courts’ Authority To Compel Technical Assistance To Government Agents In Accessing Encrypted Smartphone Data Under The All Writs Act, John L. Potapchuk 2016 Boston College Law School

A Second Bite At The Apple: Federal Courts’ Authority To Compel Technical Assistance To Government Agents In Accessing Encrypted Smartphone Data Under The All Writs Act, John L. Potapchuk

Boston College Law Review

On February 29, 2016, in In re Order Requiring Apple, Inc. Assist in Execution of Search Warrant (“In re Apple, Inc.”) the U.S. District Court for the Eastern District of New York held that the All Writs Act did not provide the legal authority to require Apple Inc. to bypass the encrypted lock-screen passcode of an iPhone for the federal government in order to execute a search warrant. Accordingly, the decision, which was the first of its kind, stripped the government of an investigative tool upon which it had routinely relied since as early as 2008. In In re ...


Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman 2016 Roger Williams University School of Law

Trending @ Rwu Law: Linn F. Freedman's Post: The Goal Of Gender Equality In Cybersecurity 08/23/2016, Linn F. Freedman

Law School Blogs

No abstract provided.


Forum Selling And Domain-Name Disputes, Daniel M. Klerman 2016 USC Law School

Forum Selling And Domain-Name Disputes, Daniel M. Klerman

University of Southern California Legal Studies Working Paper Series

The system for resolving domain-name disputes is unique in that it gives the complainant, a trademark owner who claims that a domain name violates its mark, the unilateral ability to choose the arbitration provider. As a result, providers, whether motivated by profit or prestige, have incentives to favor the complainant. Empirical analysis confirms that complainants choose providers who are more likely to decide cases for the trademark owner, rather than based on speed. The domain name-dispute resolution system should be modified to allow both complainant trademark owner and respondent domain-name registrant to strike an equal number of arbitration providers. This ...


From The Editor-In-Chief, Ibrahim A. Baggili 2016 JDFSL

From The Editor-In-Chief, Ibrahim A. Baggili

Journal of Digital Forensics, Security and Law

We are proud to share with you this special edition issue of the JDFSL. This year, JDFSL partnered with both the 6th International Conference on Digital Forensics and Cyber Crime (ICDF2C) and Systematic Approaches to Digital Forensic Engineering (SADFE)–two prominent conferences in our field that were co-hosted. Fifty-three papers were submitted, and the Technical Program Committee accepted only 17 after a rigorous review process.


Newsroom: Monestier On Web Jurisdiction 7/22/2016, Pat Murphy, Roger Williams University School of Law 2016 Rhode Island Lawyers Weekly

Newsroom: Monestier On Web Jurisdiction 7/22/2016, Pat Murphy, Roger Williams University School Of Law

Life of the Law School (1993- )

No abstract provided.


Therasense V. Becton Dickinson: A First Impression, Jason Rantanen, Lee Petherbridge 2016 Yale Law School

Therasense V. Becton Dickinson: A First Impression, Jason Rantanen, Lee Petherbridge

Jason Rantanen

This Article provides the first major analysis of the very recent en banc decision of the United States Court of Appeals for the Federal Circuit in the now famous Therasense v. Becton Dickinson. The doctrinal issue central to the case is inequitable conduct, a judicially created doctrine developed to punish patent applicants who behave inappropriately during patent prosecution, the ex parte process of patent creation. The core thesis of this Article is that Therasense could have a much more significant, complex, and nuanced impact on the legal infrastructure of American innovation than the opinion for the court appears to appreciate ...


Therasense V. Becton Dickinson: A First Impression, Jason Rantanen, Lee Petherbridge 2016 Yale Law School

Therasense V. Becton Dickinson: A First Impression, Jason Rantanen, Lee Petherbridge

Jason Rantanen

This Article provides the first major analysis of the very recent en banc decision of the United States Court of Appeals for the Federal Circuit in the now famous Therasense v. Becton Dickinson. The doctrinal issue central to the case is inequitable conduct, a judicially created doctrine developed to punish patent applicants who behave inappropriately during patent prosecution, the ex parte process of patent creation. The core thesis of this Article is that Therasense could have a much more significant, complex, and nuanced impact on the legal infrastructure of American innovation than the opinion for the court appears to appreciate ...


Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz 2016 George Mason University

Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz

Journal of Digital Forensics, Security and Law

Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing ...


Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton 2016 Cornell Law School

Data Institutionalism: A Reply To Andrew Woods, Zachary D. Clopton

Cornell Law Faculty Publications

In "Against Data Exceptionalism," Andrew K. Woods explores “one of the greatest societal and technological shifts in recent years,” which manifests in the “same old” questions about government power. The global cloud is an important feature of modern technological life that has significant consequences for individual privacy, law enforcement, and governance. Yet, as Woods suggests, the legal challenges presented by the cloud have analogies in age-old puzzles of public and private international law.

Identifying these connections is a conceptual advance, and this contribution should not be understated. But, to my mind, the most telling statement in Woods’s excellent article ...


It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow 2016 University of Minnesota Law School

It Stands To Reason: An Argument For Article Iii Standing Based On The Threat Of Future Harm In Data Breach Litigation, John Biglow

Minnesota Journal of Law, Science & Technology

No abstract provided.


3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel 2016 University of Minnesota Law School

3d Printers, Physical Viruses, And The Regulation Of Cloud Supercomputing In The Era Of Limitless Design, Peter Jensen-Haxel

Minnesota Journal of Law, Science & Technology

No abstract provided.


Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt 2016 Indiana University

Generic Pharmaceuticals And The "Unfortunate Hand" Dealt To Harmed Consumers: The Emerging State Court Resistance, Arlen W. Langvardt

Minnesota Journal of Law, Science & Technology

No abstract provided.


The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton 2016 Cloudigy Law PLLC

The Connected State Of Things: A Lawyer’S Survival Guide In An Internet Of Things World, Antigone Peyton

Catholic University Journal of Law and Technology

No abstract provided.


Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal 2016 George Mason University Law School

Decrypting Our Security: A Bipartisan Argument For A Rational Solution To The Encryption Challenge, Jamil N. Jaffer, Daniel J. Rosenthal

Catholic University Journal of Law and Technology

No abstract provided.


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe 2016 University of Florida Levin School of Law

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Elizabeth A Rowe

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores ...


Moving Beyond “Reasonable”: Clarifying The Ftc’S Use Of Its Unfairness Authority In Data Security Enforcement Actions, Timothy E. Deal 2016 Fordham University School of Law

Moving Beyond “Reasonable”: Clarifying The Ftc’S Use Of Its Unfairness Authority In Data Security Enforcement Actions, Timothy E. Deal

Fordham Law Review

Data security breaches, which compromise private consumer information, seem to be an ever-increasing threat. To stem this tide, the Federal Trade Commission (FTC) has relied upon its authority to enforce the prohibition against unfair business practices under section 5 of the Federal Trade Commission Act (“section 5”) to hold companies accountable when they fail to employ data security measures that could prevent breaches. Specifically, the FTC brings enforcement actions when it finds that companies have failed to implement “reasonable” data security measures. However, companies and scholars argue that the FTC has not provided adequate notice of which data security practices ...


Personal Data For Decisional Purposes In The Age Of Analytics: From An Individual To A Collective Dimension Of Data Protection, Alessandro Mantelero 2016 Polytechnic University of Turin

Personal Data For Decisional Purposes In The Age Of Analytics: From An Individual To A Collective Dimension Of Data Protection, Alessandro Mantelero

Alessandro Mantelero

In the big data era, new technologies and powerful analytics make it possible to collect and analyse large amounts of data in order to identify patterns in the behaviour of groups, communities and even entire countries.
Existing case law and regulations are inadequate to address the potential risks and issues related to this change of paradigm in social investigation. This is due to the fact that both the right to privacy and the more recent right to data protection are protected as individual rights. The social dimension of these rights has been taken into account by courts and policymakers in ...


Rats, Traps, And Trade Secrets, Elizabeth A. Rowe 2016 University of Florida Levin School of Law

Rats, Traps, And Trade Secrets, Elizabeth A. Rowe

Boston College Law Review

Technology has facilitated both the amount of trade secrets that are now stored electronically, and the rise of cyber intrusions. Together, this has created a storm perfectly ripe for economic espionage. Cases involving unknown or anonymous offenders who may not be in the United States and who steal trade secrets using remote access tools (“RATs”) are especially problematic. This Article is the first to address and place trade secret misappropriation within the larger backdrop of cybersecurity. First, it argues that systemic issues related to technology will continue to make legislative and judicial solutions suboptimal for cyber misappropriation. Second, it explores ...


Digital Commons powered by bepress