Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3,278 Full-Text Articles 3,045 Authors 1,294,808 Downloads 103 Institutions

All Articles in Computer Law

Faceted Search

3,278 full-text articles. Page 6 of 83.

Cover Front, 2017 Embry-Riddle Aeronautical University

Cover Front

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter, 2017 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan KR Mr., S Nirmala Dr. 2017 Jawaharlal Nehru National College of Engineering

Multiple Content Adaptive Intelligent Watermarking Schemes For The Protection Of Blocks Of A Document Image, Chetan Kr Mr., S Nirmala Dr.

Journal of Digital Forensics, Security and Law

Most of the documents contain different types of information such as white space, static information and dynamic information or mix of static and dynamic information. In this paper, multiple watermarking schemes are proposed for protection of the information content. The proposed approach comprises of three phases. In Phase-1, the edges of the source document image are extracted and the edge image is decomposed into blocks of uniform size. In Phase-2, GLCM features like energy, homogeneity, contrast and correlation are extracted from each block and the blocks are classified as no-information, static, dynamic and mix of static and dynamic information content ...


Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson menza Karie 275404, Simon Maina Karume Dr. 2017 Daystar University

Digital Forensic Readiness In Organizations: Issues And Challenges, Nickson Menza Karie 275404, Simon Maina Karume Dr.

Journal of Digital Forensics, Security and Law

With the evolution in digital technologies, organizations have been forced to change the way they plan, develop, and enact their information technology strategies. This is because modern digital technologies do not only present new opportunities to business organizations but also a different set of issues and challenges that need to be resolved. With the rising threats of cybercrimes, for example, which have been accelerated by the emergence of new digital technologies, many organizations as well as law enforcement agencies globally are now erecting proactive measures as a way to increase their ability to respond to security incidents as well as ...


Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald 2017 Edith Cowan University, Western Australia

Broadband Router Security: History, Challenges And Future Implications, Patryk Szewczyk, Rose Macdonald

Journal of Digital Forensics, Security and Law

Consumer grade broadband routers are integral to accessing the Internet and are primarily responsible for the reliable routing of data between networks. Despite the importance of broadband routers, security has never been at the forefront of their evolution. Consumers are often in possession of broadband routers that are rich in consumer-orientated features yet riddled with vulnerabilities that make the routers susceptible to exploitation. This amalgamation of theoretical research examines consumer grade broadband routers from the perspective of how they evolved, what makes them vulnerable, how they are targeted and the challenges concerning the application of security. The research further explores ...


Cover Back, 2017 Embry-Riddle Aeronautical University

Cover Back

Journal of Digital Forensics, Security and Law

No abstract provided.


Regulating Black-Box Medicine, W. Nicholson Price II 2017 University of Michigan Law School

Regulating Black-Box Medicine, W. Nicholson Price Ii

Michigan Law Review

Data drive modern medicine. And our tools to analyze those data are growing ever more powerful. As health data are collected in greater and greater amounts, sophisticated algorithms based on those data can drive medical innovation, improve the process of care, and increase efficiency. Those algorithms, however, vary widely in quality. Some are accurate and powerful, while others may be riddled with errors or based on faulty science. When an opaque algorithm recommends an insulin dose to a diabetic patient, how do we know that dose is correct? Patients, providers, and insurers face substantial difficulties in identifying high-quality algorithms; they ...


A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller 2017 Washington & Lee University School of Law

A Pantomime Of Privacy: Terrorism And Investigative Powers In German Constitutional Law, Russell A. Miller

Boston College Law Review

Germany is widely regarded as a global model for the privacy protection its constitutional regime offers against intrusive intelligence-gathering and law enforcement surveillance. There is some basis for Germany’s privacy “exceptionalism,” especially as the text of the German Constitution (“Basic Law”) provides explicit textual protections that America’s Eighteenth Century Constitution lacks. The German Federal Constitutional Court has added to those doctrines with an expansive interpretation of the more general rights to dignity (Basic Law Article 1) and the free development of one’s personality (Basic Law Article 2). This jurisprudence includes constitutional liberty guarantees such as the absolute ...


Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin 2017 Cornell Law School

Did Russian Cyber Interference In The 2016 Election Violate International Law?, Jens David Ohlin

Jens David Ohlin

When it was revealed that the Russian government interfered in the 2016 U.S. presidential election by hacking into the email system of the Democratic National Committee and releasing its emails, international lawyers were divided over whether the cyber-attack violated international law. President Obama seemingly went out of his way to describe the attack as a mere violation of “established international norms of behavior,” though some international lawyers were more willing to describe the cyber-attack as a violation of international law. However, identifying the exact legal norm that was contravened turns out to be harder than it might otherwise appear ...


Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price II 2017 University of Michigan Law School

Artificial Intelligence In Health Care: Applications And Legal Implications, W. Nicholson Price Ii

Articles

Artificial intelligence (AI) is rapidly moving to change the healthcare system. Driven by the juxtaposition of big data and powerful machine learning techniques—terms I will explain momentarily—innovators have begun to develop tools to improve the process of clinical care, to advance medical research, and to improve efficiency. These tools rely on algorithms, programs created from healthcare data that can make predictions or recommendations. However, the algorithms themselves are often too complex for their reasoning to be understood or even stated explicitly. Such algorithms may be best described as “black-box.” This article briefly describes the concept of AI in ...


Algorithmic Jim Crow, Margaret Hu 2017 Washington and Lee University School of Law

Algorithmic Jim Crow, Margaret Hu

Margaret Hu

This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on ...


You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol 2017 Southern Methodist University

You Can Run But You Can't Hide: Cell Phone Tracking Data Do Not Receive Fourth Amendment Protection, Merissa Sabol

Science and Technology Law Review

No abstract provided.


Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn 2017 Southern Methodist University

Vmg Salsoul, L.L.C. V. Ciccone: The Ninth Circuit Strikes A Pose, Applying The De Minimis Exception To Music Sampling, Jacob Quinn

Science and Technology Law Review

No abstract provided.


Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England 2017 Southern Methodist University

Is Your Roommate A Felon? Considering The Effect Of Criminalizing Password Sharing In Nosal Ii, London Ryyanen England

Science and Technology Law Review

No abstract provided.


Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness 2017 Northern Illinois University College of Law

Lost Esi Under The Federal Rules Of Civil Procedure, Jeffrey A. Parness

Science and Technology Law Review

Current Issue

Volume 20, Number 1 – The Privacy, Probability, and Political Pitfalls of Universal DNA Collection

Meghan J. Ryan 20 SMU Sci. & Tech. L. Rev. 3 Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered as the “gold standard” in criminal cases because, unlike eyewitness testimony, bite-mark evidence, hair analysis, and the like, it is considered nearly infallible. This potency of DNA evidence has led to suggestions that we, as a nation, should magnify the power of DNA by increasing the size ...


The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy 2017 Texas Tech University School of Law

The Wisdom Of Universal Dna Collection: A Reply To Professor Meghan J. Ryan, Arnold Loewy

Science and Technology Law Review

No abstract provided.


The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan 2017 Southern Methodist University

The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan

Science and Technology Law Review

Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered ...


Front Matter, 2017 Southern Methodist University

Front Matter

Science and Technology Law Review

No abstract provided.


The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah 2017 University of Michigan Law School

The Oversimplification Of Deregulation: A Case Study On Clinical Decision Support Software, Deeva V. Shah

Michigan Telecommunications and Technology Law Review

Until the December 2016 passage of the Cures Act, the FDA had regulatory power over clinical decision support (CDS) software; however, the Act removed a large group of CDS software from the FDA’s statutory authority. Congressional intent was to increase innovation by removing regulatory blockades—such as device testing and certification—from the FDA’s purview. This note argues that the enactment of this specific provision of the Act will instead stymie innovation and overlook the unfortunate safety consequences inherent in its deregulation. CDS software is a burgeoning field ripe for innovation; however, rapid innovation can often lead to ...


Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko 2017 Perm State University

Private Life Safety Provision In Digital Age, Olga Anatolyevna Kuznetsova, Natalia Bondarenko

Journal of Digital Forensics, Security and Law

Digital technology nowadays covers all the spheres of life of an individual and society’s activities. With this, it is not a secret that it can be used both for the benefit and to the detriment of the person. In digital age, private life is becoming most vulnerable to arbitrary interference. This article considers various violations of the rights to privacy, communication safety and inviolability of privacy security brought in by the digital revolution. The article concludes that the most important task in the sphere of private life safety is to find a balance of interests of the state, the ...


Digital Commons powered by bepress