Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,589 Full-Text Articles 4,395 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,589 full-text articles. Page 6 of 144.

Consensus’S Consolidation Conundrum, James J. Bernstein 2023 Georgetown University Law Center

Consensus’S Consolidation Conundrum, James J. Bernstein

Washington Journal of Law, Technology & Arts

In Part I, this piece will highlight the history, basis, and justifications for blockchain systems over the present version of the internet. This section helps to frame where consensus mechanisms may undermine Web3’s core premise. Part II will describe the fundamentals of consensus mechanisms. Thereafter, in Part III this piece will demonstrate the pitfalls of each system - and why proof of stake is not necessarily better at fighting off some of the risks associated with consensus mechanisms. Finally, in Part IV this article offers an architectural solution: introducing a series of new protocols which would increase the cost of …


“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini 2023 Pace University Elisabeth Haub School of Law

“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini

Washington Journal of Law, Technology & Arts

Telehealth’s expansion during the COVID-19 pandemic has drastically changed the approach to healthcare in the United States. This is particularly true in the behavioral health sector where several behavioral telehealth companies have emerged to treat Attention-Deficit/Hyperactivity Disorder (“ADHD”). These companies utilize a direct-to-consumer (“DTC”) model with a virtual platform that connects subscribing patients to medical providers who can treat them for ADHD. Although this telemedicine model emphasizes convenience and efficiency, the reality is that those benefits come at the cost of patient care. The federal regulations promulgated in the Ryan Haight Online Pharmacy Consumer Protection Act of 2008 to curtail …


Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr. 2023 Assistant Professor of Civil Law - College of Law University of Science and Technology in Fujairah

Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr.

مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL

It is completely easy to pass and send any electronic data everywhere to the persons you want in the world in a very quick and short time, regardless the size and the data type.

This is due to the invention of electronic programs that help to save time and efforts. (the E – mail).

As a result of this electronic development in the all related fields that serve humankind, a new encounter technology and illegal use of technology has occurred and used illegally by hackers to destroy and penetrate exclusive information for specific people.

For this illegal hacking attempt requires …


The Five Internet Rights, Nicholas J. Nugent 2023 University of Tennessee

The Five Internet Rights, Nicholas J. Nugent

Washington Law Review

Since the dawn of the commercial internet, content moderation has operated under an implicit social contract that website operators could accept or reject users and content as they saw fit, but users in turn could self-publish their views on their own websites if no one else would have them. However, as online service providers and activists have become ever more innovative and aggressive in their efforts to deplatform controversial speakers, content moderation has progressively moved down into the core infrastructure of the internet, targeting critical resources, such as networks, domain names, and IP addresses, on which all websites depend. These …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum 2023 University of South Florida

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach 2023 University of Detroit Mercy School of Law

The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach

Seattle Journal of Technology, Environmental & Innovation Law

The COVID-19 pandemic hit communities of color hard. The City of Detroit was particularly vulnerable to COVID-19 due to racial, socioeconomic, and environmental health factors. To analyze the exacerbating role of technology and connectivity challenges on older Detroiters' health in a pandemic, we first examined Detroit’s demographics. This analysis involved looking at the continued evolution of the City's population toward older adults, as well as the impact of COVID-19 and the healthcare services on Detroit’s elder population. Next, we examined Detroit’s internet access challenges, including the presence of digital exclusion among older adults in Detroit, the impact of COVID-19 on …


Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons 2023 Seattle University School of Law

Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons

Seattle Journal of Technology, Environmental & Innovation Law

The dawning of the digital age introduced new and unique interpretive quandaries for judges and litigators alike. These quandaries include (but are not limited to) misinterpretation of pictorial slang as used in instant messaging, new or collateral meanings invented by phrases paired with specific emoticons or emojis, and the existence of emojis alone as communicative accessories.

This Note analyzes how lawyers and judges have essential free reign to treat emojis as they see fit: a prosecutor can argue, even in good faith, that the inclusion of an emoji depicting an open flame means the sender knew the heroin he sold …


From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica McGarvie 2023 Seattle University School of Law

From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica Mcgarvie

Seattle Journal of Technology, Environmental & Innovation Law

In the summer of 2021, Apple announced it would release a Child Safety Feature (CSF) aimed at reducing Child Sex Abuse Materials (CSAM) on its platform. The CSF would scan all images a user uploaded to their iCloud for CSAM, and Apple would report an account with 30 or more flagged images to the National Center for Missing and Exploited Children. Despite Apple’s good intentions, they received intense backlash, with many critics arguing the proposed CSF eroded a user’s privacy. This article explores the technology behind Apple’s CSF and compares it to similar features used by other prominent tech companies. …


A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad 2023 Seattle University School of Law

A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad

Seattle Journal of Technology, Environmental & Innovation Law

A New Right is the Wrong Tactic: Bring Legal Actions Against States for Internet Shutdowns Instead of Working Towards a Human Right to the Internet (Part 1) is the first of a two-part series dealing with an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 details the current tactics and impacts of Internet shutdowns and which human rights are most likely to be violated by or during a shutdown. Part 2 will address the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this …


Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina 2023 DePaul University College of Law

Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc., Francis Brefo 2023 DePaul University College of Law

Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc., Francis Brefo

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution, Grace Hodges 2023 DePaul University College of Law

How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution, Grace Hodges

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Aclu V. Clearview Ai, Inc.,, Isra Ahmed 2023 DePaul University College of Law

Aclu V. Clearview Ai, Inc.,, Isra Ahmed

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Texas’ War On Social Media: Censorship Or False Flag, Leni Morales 2023 DePaul University College of Law

Texas’ War On Social Media: Censorship Or False Flag, Leni Morales

DePaul Journal of Art, Technology & Intellectual Property Law

No abstract provided.


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman 2023 University of South Florida

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer 2023 National Defense University, College of Information and Cyberspace

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane 2023 University of South Florida

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


The Common Law Inside Social Media, Anita Bernstein 2023 Brooklyn Law School

The Common Law Inside Social Media, Anita Bernstein

Faculty Scholarship

No abstract provided.


Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin 2023 Texas A&M University School of Law

Mass E-Carceration: Electronic Monitoring As A Bail Condition, Sara Zampierin

Faculty Scholarship

Over the past decade, the immigration and criminal legal systems have increasingly relied on electronic monitoring as a bail condition; hundreds of thousands of people live under this monitoring on any given day. Decisionmakers purport to impose these conditions to release more individuals from detention and to maintain control over individuals they perceive to pose some risk of flight or to public safety. But the data do not show that electronic monitoring successfully mitigates these risks or that it leads to fewer individuals in detention. Electronic monitoring also comes with severe restrictions on individual liberty and leads to harmful effects …


Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing, Nicola Countouris, Valerio De Stefano 2023 University College London

Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing, Nicola Countouris, Valerio De Stefano

Articles & Book Chapters

Since the Covid-19 pandemic, remote work has acquired quasi-Marmite status. It has become difficult, if not impossible, to approach the issue in a measured and dispassionate way, which is one of the reasons books such as the present one are being published. Remote work is often seen as anathema by some who associate it with laziness, low productivity and the degradation of the social fabric of firms and of their creative and collaborative potential. The notorious views of CEOs such as Tesla and Twitter’s Elon Musk or JP Morgan’s Jamie Dimon come to mind, indicative – in the view of …


Digital Commons powered by bepress