Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,589 Full-Text Articles 4,395 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,589 full-text articles. Page 77 of 144.

Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram 2016 Schulich School of Law, Dalhousie University

Book Review: Jonathan Clough, Principles Of Cybercrime, 2nd Ed (Cambridge: Cambridge University Press, 2015), Christopher D. Ram

Canadian Journal of Law and Technology

The past decade has seen an enormous explosion of scholarship on the subject of cybercrime, as technologies and offenders pose new challenges and law enforcement, government and academic experts struggle to keep up. The new, second edition of Professor Jonathan Clough’s book occupies a fairly substantial, but specific niche in this increasingly diverse and complex landscape. Principles of Cybercrime contains only a cursory review of the history and criminology of cybercrime, it does not deal at all with IT security, investigative or enforcement matters, and discussion of cybercrime as a global issue is limited to brief discussions of the 2001 …


A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia 2016 Notre Dame Law School

A Code-Based Approach To Unauthorized Access Under The Computer Fraud Abuse Act, Patricia L. Bellia

Journal Articles

Thirty years ago, Congress passed the Computer Fraud and Abuse Act (CFAA) to combat the emerging problem of computer crime. The statute’s core prohibitions targeted one who “accesses” a computer “without authorization” or who “exceeds authorized access.” Over time, incremental statutory changes and large-scale technical changes have dramatically expanded the potential scope of the CFAA. The question of what constitutes unauthorized access has taken on far greater significance than it had thirty years ago, and courts remain deeply divided on this question. This Article explores the text, purpose, and history of the CFAA, as well as a range of normative …


A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley 2016 Columbia Law School

A Machine Learning Classifier For Corporate Opportunity Waivers, Gabriel V. Rauterberg, Eric L. Talley

Faculty Scholarship

Rauterberg & Talley (2017) develop a data set of “corporate opportunity waivers” (COWs) – significant contractual modifications of fiduciary duties – sampled from SEC filings. Part of their analysis utilizes a machine learning (ML) classifier to extend their data set beyond the hand-coded sample. Because the ML approach is likely unfamiliar to some readers, and in the light of its great potential across other areas of law and finance research, this note explains the basic components using a simple example, and it demonstrates strategies for calibrating and evaluating the classifier.


Employee Electronic Communications In A Boundaryless World, Robert Sprague 2015 University of Wyoming

Employee Electronic Communications In A Boundaryless World, Robert Sprague

Robert Sprague

In 2007, the National Labor Relations Board decided that an employer could maintain an email communications policy that prohibits nonwork-related messages, even if those messages involved communications otherwise protected under the National Labor Relations Act. In December 2014, the National Labor Relations Board reversed this holding, but in doing so, limited its decision to just workplace email. This article argues that such a prescription is outdated and archaic in light of today’s modern workplace filled with communications devices and systems that blur the distinction between work and personal life. This article explains that such a prescription can cause employees to …


The Digital Dionysus: Nietzsche & The Network-Centric Condition, 2015 Selected Works

The Digital Dionysus: Nietzsche & The Network-Centric Condition

Dan Mellamphy

No abstract provided.


Private Technology (Foreword), Daniel Harris Brean 2015 The University of Akron School of Law

Private Technology (Foreword), Daniel Harris Brean

Daniel Harris Brean

Privacy and technology issues tend to implicate one another. Sometimes they reinforce each other, such as when improved data security thwarts hackers. But often the use of technology diminishes privacy because, in order to benefit from the technology, users must surrender some personal, otherwise private information. In such cases the technology may be powerful, profitable, fun, or convenient, but the privacy consequences of its use can be quite profound.


Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson 2015 University of Oklahoma College of Law

Fourth Amendment Time Machines (And What They Might Say About Police Body Cameras), Stephen E. Henderson

Stephen E Henderson

When it comes to criminal investigation, time travel is increasingly possible.  Despite longstanding roots in traditional investigation, science is today providing something fundamentally different in the form of remarkably complete digital records.  And those big data records not only store our past, but thanks to data mining they are in many circumstances eerily good at predicting our future.  So, now that we stand on the threshold of investigatory time travel, how should the Fourth Amendment and legislation respond?  How should we approach bulk government capture, such as by a solar-powered drone employing wide-area persistent stare technology?  Is it meaningfully different …


Front Matter, 2015 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Back Matter, 2015 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler 2015 Catholic University of America, Columbus School of Law

Oracle America, Inc. V. Google, Inc.,750 F.3d 1339 (Fed. Cir. 2014), Cert. Denied: Ideas, Methods, And Expression - Whose Innovation Is Protected?, Christopher J. Geissler

Catholic University Journal of Law and Technology

No abstract provided.


Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao 2015 Catholic University of America, Columbus School of Law

Implications For The Future Of Global Data Security And Privacy: The Territorial Application Of The Stored Communications Act And The Microsoft Case, Russell Hsiao

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2015 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges 2015 Google Inc; University of Colorado at Boulder; Katholieke Universiteit Leuven

Internet Governance Is Our Shared Responsibility, Vinton Cerf, Patrick Ryan, Max Senges

Patrick T. Ryan

This essay looks at the the different roles that institutions play in the Internet governance ecosystem. We propose a model for thinking of Internet governance within the context of the layered model of the Internet. We use the example of the negotiations in Dubai in 2102 at the World Conference on International Telecommunications to show why it is important for different institutions within the governance system to focus on their areas of expertise (e.g., the ITU, ICANN, and IGF). Several areas of conflict are reviewed, such as the desire to promote more broadband infrastructure (a topic that is in the …


Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon 2015 Purdue University

Web Based Cyber Forensics Training For Law Enforcement, Nick Sturgeon

Purdue Polytechnic Masters Theses

Training and education are two of the most important aspects within cyber forensics. These topics have been of concern since the inception of the field. Training law enforcement is particularly important to ensure proper execution of the digital forensics process. It is also important because the proliferation of technology in to society continues to grow at an exponential rate. Just as technology is used for good there are those that will choose to use it for criminal gains. It is critical that Law Enforcement have the tools and training in cyber forensics. This research looked to determine if web based …


The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss 2015 University of Georgia School of Law

The Integrated Approach: A Solution To Patent Subject Matter Eligibility Standards In The Software Context, Carrie Moss

Journal of Intellectual Property Law

No abstract provided.


Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker 2015 University of Georgia School of Law

Gray Works: How The Failure Of Copyright Law To Keep Pace With Technological Advancement In The Digital Age Has Created A Class Of Works Whose Protection Is Uncertain… And What Can Be Done About It, Kenneth R.L. Parker

Journal of Intellectual Property Law

No abstract provided.


Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell 2015 University of Georgia School of Law

Fighting Piracy With Censorship: The Operation In Our Sites Domain Seizures V. Free Speech, Michael Joseph Harrell

Journal of Intellectual Property Law

No abstract provided.


Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett 2015 Yale Law School

Toward A Textualist Paradigm For Interpreting Emoticons, John Ehrett

John Ehrett

I evaluate the dimensions of courts’ current interpretive dilemma, and subsequently sketch a possible framework for extending traditional statutory interpretation principles into this new domain: throughout the following analysis, I describe the process of attaching cognizable linguistic referents to emoticons and emojis throughout as symbolical reification, and propose a normative way forward for those tasked with deriving meaning from emoji-laden communications.


Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg 2015 John Marshall Law School

Session Ii: Historical Perspectives On Privacy In American Law, 29 J. Marshall J. Computer & Info. L. 319 (2012), Steven D. Schwinn, Alberto Bernabe, Kathryn Kolbert, Adam D. Moore, Marc Rotenberg

Alberto Bernabe

No abstract provided.


Taxonomy Of The Snowden Disclosures, Margaret Hu 2015 William & Mary Law School

Taxonomy Of The Snowden Disclosures, Margaret Hu

Faculty Publications

This brief Essay offers a proposed taxonomy of the Snowden Disclosures. An informed discussion on the legality and constitutionality of the emerging cybersurveillance and mass dataveillance programs revealed by former NSA contractor Edward Snowden necessitates the furtherance of cybersurveillance aptitude. This Essay contends, therefore, that a detailed examination of the Snowden disclosures requires not just a careful inquiry into the legal and constitutional framework that guides the oversight of these programs. A close interrogation also requires a careful inquiry into the big data architecture that guides them. This inquiry includes examining the underlying theories of data science and the rationales …


Digital Commons powered by bepress