Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,393 Full-Text Articles 4,164 Authors 3,266,356 Downloads 129 Institutions

All Articles in Computer Law

Faceted Search

4,393 full-text articles. Page 1 of 134.

What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar 2023 Notre Dame Law School

What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar

Washington Journal of Law, Technology & Arts

The persistence of the privacy paradox is proof that current industry regulation is insufficient to protect consumer’s privacy. Although consumer choice is essential, we argue that it should not be the main pillar of modern data privacy legislation. This article argues that legislation should aim to protect consumer’s personal data in the first place, while also giving internet users the choice to opt-in to the processing of their information. Ideally, privacy by design principles would be mandated by law, making privacy an essential component of the architecture of every tech-product and service.


Consensus’S Consolidation Conundrum, James J. Bernstein 2023 Georgetown University Law Center

Consensus’S Consolidation Conundrum, James J. Bernstein

Washington Journal of Law, Technology & Arts

In Part I, this piece will highlight the history, basis, and justifications for blockchain systems over the present version of the internet. This section helps to frame where consensus mechanisms may undermine Web3’s core premise. Part II will describe the fundamentals of consensus mechanisms. Thereafter, in Part III this piece will demonstrate the pitfalls of each system - and why proof of stake is not necessarily better at fighting off some of the risks associated with consensus mechanisms. Finally, in Part IV this article offers an architectural solution: introducing a series of new protocols which would increase the cost of …


“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini 2023 Pace University Elisabeth Haub School of Law

“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini

Washington Journal of Law, Technology & Arts

Telehealth’s expansion during the COVID-19 pandemic has drastically changed the approach to healthcare in the United States. This is particularly true in the behavioral health sector where several behavioral telehealth companies have emerged to treat Attention-Deficit/Hyperactivity Disorder (“ADHD”). These companies utilize a direct-to-consumer (“DTC”) model with a virtual platform that connects subscribing patients to medical providers who can treat them for ADHD. Although this telemedicine model emphasizes convenience and efficiency, the reality is that those benefits come at the cost of patient care. The federal regulations promulgated in the Ryan Haight Online Pharmacy Consumer Protection Act of 2008 to curtail …


Genetic Technologies: Patent Protections & The Case For Technology Transfer, Smitha Gundavajhala 2023 University of Washington School of Law

Genetic Technologies: Patent Protections & The Case For Technology Transfer, Smitha Gundavajhala

Washington Journal of Law, Technology & Arts

Genetic technologies range in scope from agricultural to medical applications. Most recently, during the COVID-19 pandemic, companies like Moderna developed and patented genetic technologies for diagnostic and therapeutic purposes, like the mRNA vaccine. However, patent protection provides these companies with a monopoly that ultimately limits domestic production of generic versions, thus limiting access to life-saving diagnostics and therapeutics. When a company located in one country files a patent for recognition in another country, it effectively places a hold on production of any technologies covered by that patent’s reach, whether that patent is enforced or not. However, the TRIPS Agreement, the …


Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr. 2023 Assistant Professor of Civil Law - College of Law University of Science and Technology in Fujairah

Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr.

مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL

It is completely easy to pass and send any electronic data everywhere to the persons you want in the world in a very quick and short time, regardless the size and the data type.

This is due to the invention of electronic programs that help to save time and efforts. (the E – mail).

As a result of this electronic development in the all related fields that serve humankind, a new encounter technology and illegal use of technology has occurred and used illegally by hackers to destroy and penetrate exclusive information for specific people.

For this illegal hacking attempt requires …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach 2023 University of Detroit Mercy School of Law

The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach

Seattle Journal of Technology, Environmental & Innovation Law

The COVID-19 pandemic hit communities of color hard. The City of Detroit was particularly vulnerable to COVID-19 due to racial, socioeconomic, and environmental health factors. To analyze the exacerbating role of technology and connectivity challenges on older Detroiters' health in a pandemic, we first examined Detroit’s demographics. This analysis involved looking at the continued evolution of the City's population toward older adults, as well as the impact of COVID-19 and the healthcare services on Detroit’s elder population. Next, we examined Detroit’s internet access challenges, including the presence of digital exclusion among older adults in Detroit, the impact of COVID-19 on …


Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons 2023 Seattle University School of Law

Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons

Seattle Journal of Technology, Environmental & Innovation Law

The dawning of the digital age introduced new and unique interpretive quandaries for judges and litigators alike. These quandaries include (but are not limited to) misinterpretation of pictorial slang as used in instant messaging, new or collateral meanings invented by phrases paired with specific emoticons or emojis, and the existence of emojis alone as communicative accessories.

This Note analyzes how lawyers and judges have essential free reign to treat emojis as they see fit: a prosecutor can argue, even in good faith, that the inclusion of an emoji depicting an open flame means the sender knew the heroin he sold …


From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica McGarvie 2023 Seattle University School of Law

From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica Mcgarvie

Seattle Journal of Technology, Environmental & Innovation Law

In the summer of 2021, Apple announced it would release a Child Safety Feature (CSF) aimed at reducing Child Sex Abuse Materials (CSAM) on its platform. The CSF would scan all images a user uploaded to their iCloud for CSAM, and Apple would report an account with 30 or more flagged images to the National Center for Missing and Exploited Children. Despite Apple’s good intentions, they received intense backlash, with many critics arguing the proposed CSF eroded a user’s privacy. This article explores the technology behind Apple’s CSF and compares it to similar features used by other prominent tech companies. …


A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad 2023 Seattle University School of Law

A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad

Seattle Journal of Technology, Environmental & Innovation Law

A New Right is the Wrong Tactic: Bring Legal Actions Against States for Internet Shutdowns Instead of Working Towards a Human Right to the Internet (Part 1) is the first of a two-part series dealing with an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 details the current tactics and impacts of Internet shutdowns and which human rights are most likely to be violated by or during a shutdown. Part 2 will address the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this …


Texas’ War On Social Media: Censorship Or False Flag, Leni Morales 2023 DePaul University College of Law

Texas’ War On Social Media: Censorship Or False Flag, Leni Morales

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc., Francis Brefo 2023 DePaul University College of Law

Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc., Francis Brefo

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution, Grace Hodges 2023 DePaul University College of Law

How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution, Grace Hodges

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Aclu V. Clearview Ai, Inc.,, Isra Ahmed 2023 DePaul University College of Law

Aclu V. Clearview Ai, Inc.,, Isra Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina 2023 DePaul University College of Law

Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer 2023 National Defense University, College of Information and Cyberspace

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin 2023 Texas A&M University School of Law

Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin

Faculty Scholarship

Over the past decade, the immigration and criminal legal systems have increasingly relied on electronic monitoring as a bail condition; hundreds of thousands of people live under this monitoring on any given day. Decisionmakers purport to impose these conditions to release more individuals from detention and to maintain control over individuals they perceive to pose some risk of flight or to public safety. But the data do not show that electronic monitoring successfully mitigates these risks or that it leads to fewer individuals in detention. Electronic monitoring also comes with severe restrictions on individual liberty and leads to harmful effects …


The Perks Of Being Human, Max Stul Oppenheimer 2023 University of Baltimore School of Law

The Perks Of Being Human, Max Stul Oppenheimer

Washington and Lee Law Review Online

The power of artificial intelligence has recently entered the public consciousness, prompting debates over numerous legal issues raised by use of the tool. Among the questions that need to be resolved is whether to grant intellectual property rights to copyrightable works or patentable inventions created by a machine, where there is no human intervention sufficient to grant those rights to the human. Both the U. S. Copyright Office and the U. S. Patent and Trademark Office have taken the position that in cases where there is no human author or inventor, there is no right to copyright or patent protection. …


Digital Commons powered by bepress