Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,279 Full-Text Articles 3,046 Authors 1,294,808 Downloads 103 Institutions

All Articles in Computer Law

Faceted Search

3,279 full-text articles. Page 4 of 83.

Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina 2018 Perm State University

Use Of House Arrest In The Context Of The Respecting The Constitutional Rights Of An Individual In Russia, Svetlana Afanasieva 2365999, Irina Kilina

Journal of Digital Forensics, Security and Law

The authors analyze the selection of preventive measures in the form of house arrest in Russian criminal procedures on the basis of universal and European standards of guaranteeing respect for individual rights. The article states that the application of preventive measures significantly restricts the right to protect the dignity of the individual, the right to freedom and personal inviolability, the right to free movement, choose the place of residence. The authors argue for the alternative method of applying the house arrest. as a form of prevention This preventive measure, unlike detention does not provide for the isolation of a person ...


Back Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris 2018 Duke Law School

Hacking The Internet Of Things: Vulnerabilities, Dangers, And Legal Responses, Sara Sun Beale, Peter Berris

Duke Law & Technology Review

The Internet of Things (IoT) is here and growing rapidly as consumers eagerly adopt internet-enabled devices for their utility, features, and convenience. But this dramatic expansion also exacerbates two underlying dangers in the IoT. First, hackers in the IoT may attempt to gain control of internet-enabled devices, causing negative consequences in the physical world. Given that objects with internet connectivity range from household appliances and automobiles to major infrastructure components, this danger is potentially severe. Indeed, in the last few years, hackers have gained control of cars, trains, and dams, and some experts think that even commercial airplanes could be ...


Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan 2018 University of Massachusetts School of Law

Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan

University of Massachusetts Law Review

Technology has seen a boom over the last few decades, making innovative leaps that border on science fiction. With the most recent technological leap came a new frontier of intellectual property and birthed a new class of criminal: the cyber-pirate. This Article discusses cyber-piracy and its interactions and implications for modern United States copyright law. The Article explains how copyright law, unprepared for the boom, struggled to adapt as courts reconciled the widely physical perceptions of copyright with the digital information being transferred between billions of users instantaneously. The Article also explores how cyber-piracy has made, and continues to make ...


Cybersecurity And Tax Information: A Vicious Cycle?, Diane Ring 2018 Boston College Law School

Cybersecurity And Tax Information: A Vicious Cycle?, Diane Ring

Diane M. Ring

A review of Michael Hatfield, Cybersecurity and Tax Reform, 93 Ind. L.J., scheduled to be published in Spring 2018.


Trademark Issues Relating To Digitalized Flavor, John T. Cross 2018 University of Louisville School of Law

Trademark Issues Relating To Digitalized Flavor, John T. Cross

Yale Journal of Law and Technology

Over the past three decades, most people have become accustomed to dealing with music, film, photography, and other expressive media stored in digital format. However, while great strides have been made in digitalizing what we see and hear, there has been far less progress in digitalizing the other senses. This lack of progress is especially evident for the chemical senses of smell and taste. However, all this may soon change. Recently, several groups of researchers have commenced various projects that could store odors and flavors in a digital format, and replicate them for humans.


Block-By-Block: Leveraging The Power Of Blockchain Technology To Build Trust And Promote Cyber Peace, Scott J. Shackelford, Steve Myers 2018 Yale Law School

Block-By-Block: Leveraging The Power Of Blockchain Technology To Build Trust And Promote Cyber Peace, Scott J. Shackelford, Steve Myers

Yale Journal of Law and Technology

There has been increasing interest in the transformative power of not only crypto-currencies like Bitcoin, but also the technology underlying them-namely blockchain. To the uninitiated, a blockchain is a sophisticated, distributed online ledger that has the potential, according to Goldman Sachs, to "change 'everything."' From making businesses more efficient to recording property deeds to engendering the growth of 'smart' contracts, blockchain technology is now being investigated by a huge range of organizations and is attracting billions in venture funding. Even the U.S. Defense Advanced Research Projects Agency (DARPA) is investigating blockchain technology to "create an unhackable messaging system."


Whose Song Is That? Searching For Equity And Inspiration For Music Vocalists Under The Copyright Act, Tuneen E. Chisolm 2018 University of Pennsylvania Law School

Whose Song Is That? Searching For Equity And Inspiration For Music Vocalists Under The Copyright Act, Tuneen E. Chisolm

Yale Journal of Law and Technology

This article examines some of the inherent inequities that

exist for music vocalists under the United States Copyright Act and related music industry practices, due to the limited scope of protection given to sound recordings and the absence of an express inclusion of nondramatic music performance as a protected work under Section 102(a). It argues for expansion of the rights afforded to include, for music vocalists with respect to nondramatic works, an inalienable copyright, separate from the sound recording copyright, based upon a sole right of authorship in their performance as an applied composition, once fixed. It also argues ...


Social Media Searches And The Reasonable Expectation Of Privacy, Brian Mund 2018 Yale Law School

Social Media Searches And The Reasonable Expectation Of Privacy, Brian Mund

Yale Journal of Law and Technology

Under existing law, social media information communicated through behind password -protected pages receives no reasonable expectation of privacy. The Note argues that the Fourth Amendment requires a greater degree of privacy protection for social media data. Judicial and legislative activity provides indicia of a willingness to reconsider citizens' reasonable expectation of privacy and reverse an anachronistic equation of privacy with secrecy.
Government monitoring of private social media pages constitutes a deeply invasive form of surveillance and, if government agents employ covert tactics to gain access to private social media network s, then the Fourth Amendment controls government use of that ...


Don't Fence Me In: Reforming Trade And Investment Law To Better Facilitate Cross-Border Data Transfer, Andrew D. Mitchell, Jarrod Hepburn 2018 Professor, Melbourne Law School, University of Melbourne

Don't Fence Me In: Reforming Trade And Investment Law To Better Facilitate Cross-Border Data Transfer, Andrew D. Mitchell, Jarrod Hepburn

Yale Journal of Law and Technology

The transfer of data across borders support s trade in most service industries around the world as well as the growth of traditional manufacturing sectors. However, several countries have begun to adopt laws impeding the cross-border transfer of data, ostensibly in pursuit of policy objectives such as national security, public morals or public order, and privacy. Such domestic measures create potential concerns under both international trade law and international investment law. Accordingly, recent trade and investment negotiations such as the Trans-Pacific Partnership Agreement (TPP) include specific provisions mandating the permissibility of cross-border data transfer and prohibiting data localization in certain ...


Tackling The Algorithmic Control Crisis -The Technical, Legal, And Ethical Challenges Of Research Into Algorithmic Agents, B. Bodo, N Helberger, K Irion, K Zuiderveen Borgesius, J Moller, B van de Velde, N Bol, B van Es, C de Vreese 2018 Institute for Information Law, University of Amsterdam

Tackling The Algorithmic Control Crisis -The Technical, Legal, And Ethical Challenges Of Research Into Algorithmic Agents, B. Bodo, N Helberger, K Irion, K Zuiderveen Borgesius, J Moller, B Van De Velde, N Bol, B Van Es, C De Vreese

Yale Journal of Law and Technology

Algorithmic agents permeate every instant of our online existence. Based on our digital profiles built from the massive surveillance of our digital existence, algorithmic agents rank search results, filter our emails, hide and show news items on social networks feeds, try to guess what products we might buy next for ourselves and for others, what movies we want to watch, and when we might be pregnant. Algorithmic agents select, filter, and recommend products,
information, and people; they increasingly customize our physical environments, including the temperature and the mood .


Going Native: Can Consumers Recognize Native Advertising? Does It Matter?, David A. Hyman, David Franklyn, Calla Yee, Mohammad Rahmati 2018 Georgetown University

Going Native: Can Consumers Recognize Native Advertising? Does It Matter?, David A. Hyman, David Franklyn, Calla Yee, Mohammad Rahmati

Yale Journal of Law and Technology

Native advertising, which matches the look and feel of unpaid news and editorials, has exploded online. The Federal Trade Commission has long required advertising to be clearly and conspicuously labeled, and it recently reiterated that these requirements apply to native advertising. We explore whether respondents can distinguish native advertising and "regular" ads from unpaid content, using 16 native ads, 5 ''regular" ads, and 8 examples of news / editorial content, drawn from multiple sources and plat forms. Overall, only 37% of respondents thought that the tested examples of native
advertising were paid content, compared to 81% for "regular" advertising, with variation ...


When Timekeeping Software Undermines Compliance, Elizabeth Tippett, Charlotte S. Alexander, Zev J. Eigen 2018 University of Oregon School of Law

When Timekeeping Software Undermines Compliance, Elizabeth Tippett, Charlotte S. Alexander, Zev J. Eigen

Yale Journal of Law and Technology

Electronic timekeeping is a ubiquitous feature of the modern workplace. Time and attendance software enables employers to record employees' hours worked, breaks taken, and related data to determine compensation. Sometimes this software also undermines wage and hour law, allowing bad actor employers more readily to manipulate employee time cards, set up automatic default rules that shave hours from employees' paychecks, and disguise edits to records of wages and hours. Software could enable transparency, but when it serves to obfuscate instead, it misses an opportunity to reduce costly legal risk for employers and protect employee rights. This article examines thirteen commonly ...


Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert 2018 University of Pennsylvania Law School

Regulating Robo Advice Across The Financial Services Industry, Tom Baker, Benedict G. C. Dellaert

Faculty Scholarship

Automated financial product advisors – “robo advisors” – are emerging across the financial services industry, helping consumers choose investments, banking products, and insurance policies. Robo advisors have the potential to lower the cost and increase the quality and transparency of financial advice for consumers. But they also pose significant new challenges for regulators who are accustomed to assessing human intermediaries. A well-designed robo advisor will be honest and competent, and it will recommend only suitable products. Because humans design and implement robo advisors, however, honesty, competence, and suitability cannot simply be assumed. Moreover, robo advisors pose new scale risks that are different ...


Is The License Still The Product?, Robert W. Gomulkiewicz 2018 University of Washington School of Law

Is The License Still The Product?, Robert W. Gomulkiewicz

Articles

The Supreme Court rejected the use of patent law to enforce conditional sales contracts in Impression Products v. Lexmark. The case appears to be just another step in the Supreme Court’s ongoing campaign to reset the Federal Circuit’s patent law jurisprudence. However, the decision casts a shadow on cases from all federal circuits that have enforced software licenses for more than 20 years and potentially imperils the business models on which software developers rely to create innovative products and to bring those products to market in a variety of useful ways.

For over two decades, we could say ...


Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair 2018 University of Washington School of Law

Is Tricking A Robot Hacking?, Ryan Calo, Ivan Evtimov, Earlence Fernandes, Tadayoshi Kohno, David O'Hair

Tech Policy Lab

The authors of this essay represent an interdisciplinary team of experts in machine learning, computer security, and law. Our aim is to introduce the law and policy community within and beyond academia to the ways adversarial machine learning (ML) alter the nature of hacking and with it the cybersecurity landscape. Using the Computer Fraud and Abuse Act of 1986—the paradigmatic federal anti-hacking law—as a case study, we mean to evidence the burgeoning disconnect between law and technical practice. And we hope to explain what is at stake should we fail to address the uncertainty that flows from the ...


The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary 2018 The Catholic University of America, Columbus School of Law

The Indecency And Injustice Of Section 230 Of The Communications Decency Act, Mary Graw Leary

Scholarly Articles and Other Contributions

Section 230 of the Communications Decency Act is a 1996 law wholly inadequate to address 21st Century problems. The most egregious example of this is online sex trafficking, which was allowed not only to exist, but also to thrive due, in large part, to §230. This Article examines the development of the jurisprudence regarding online advertising of sex-trafficking victims and juxtaposes the forces that created § 230 with those preventing its timely amendment. This Article argues that, although § 230 was never intended to create a regime of absolute immunity for defendant websites, a perverse interpretation of the non-sex trafficking jurisprudence ...


Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall 2018 John Marshall Law School

Oversharenting: Is It Really Your Story To Tell?, 33 J. Marshall J. Info. Tech. & Privacy L. 121 (2018), Holly Kathleen Hall

The John Marshall Journal of Information Technology & Privacy Law

Social media is about sharing information. If you are a parent, often the tendency is to relate every aspect of your children’s lives. Most of the time, children do not consent to postings about them and will have a permanent digital shadow created by their parents that follows them the rest of their lives. The purpose of this article is to analyze the current status and potential future of children’s online privacy from a comparative legal approach, highlighting recent case law in the United Kingdom, which is trending toward carving out special privacy rights for children. This contrasts ...


Digital Commons powered by bepress