Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

4,607 Full-Text Articles 4,424 Authors 3,876,593 Downloads 132 Institutions

All Articles in Computer Law

Faceted Search

4,607 full-text articles. Page 84 of 145.

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern 2015 University of Pennsylvania Carey Law School

Introduction: Cyber And The Changing Face Of War, Claire Oakes Finkelstein, Kevin H. Govern

All Faculty Scholarship

Cyberweapons and cyberwarfare are one of the most dangerous innovations of recent years, and a significant threat to national security. Cyberweapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Cyberwarfare occupies an ambiguous status in the conventions of the laws of war. This book addresses Ethical and legal issues surrounding cyberwarfare by considering whether the Laws of Armed Conflict apply to cyberspace and the ethical position of cyberwarfare against the background of our generally recognized moral traditions in armed conflict. The book explores these moral and legal …


Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson 2015 Loyola Marymount University and Loyola Law School

Silencing The Call To Arms: A Shift Away From Cyber Attacks As Warfare, Ryan Patterson

Loyola of Los Angeles Law Review

Cyberspace has developed into an indispensable aspect of modern society, but not without risk. Cyber attacks have increased in frequency, with many states declaring cyber operations a priority in what has been called the newest domain of warfare. But what rules govern? The Tallinn Manual on the International Law Applicable to Cyber Warfare suggests existent laws of war are sufficient to govern cyber activities; however, the Tallinn Manual ignores fundamental problems and unique differences between cyber attacks and kinetic attacks. This Article argues that several crucial impediments frustrate placing cyber attacks within the current umbra of warfare, chiefly the problems …


No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott 2015 University of Georgia School of Law

No. 9 - Cybersecurity And National Defense: Building A Public-Private Partnership, Rebecca H. White, C. Donald Johnson, Loch K. Johnson, Quentin E. Hodgson, Jamil Jaffer, Clete D. Johnson, Victoria Woodbine, Timothy L. Meyer, Adam Golodner, Barry Hensley, Andrea Matwyshyn, Jacob Olcott

Occasional Papers Series

Organized and sponsored by the Dean Rusk Center for International Law and Policy, Cybersecurity and National Defense: Building a Public-Private Partnership was a daylong conference exploring issues related to the national security dimensions of cyber attacks as well as the role of the private sector in addressing cybersecurity risks. The overarching theme was the scope of public-private collaboration in addressing cybersecurity risks and the potential for future cooperation between government and the private sector. Clete D. Johnson, Chief Counsel for Cybersecurity at the Federal Communications Commission gave a lunchtime address on the FCC’s approach to communications security in the Internet …


Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans 2015 Indiana University - Bloomington

Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans

Indiana Law Journal

This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …


Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu 2015 William & Mary Law School

Small Data Surveillance V. Big Data Cybersurveillance, Margaret Hu

Faculty Publications

This Article highlights some of the critical distinctions between small data surveillance and big data cybersurveillance as methods of intelligence gathering. Specifically, in the intelligence context, it appears that "collect-it-all" tools in a big data world can now potentially facilitate the construction, by the intelligence community, of other individuals' digital avatars. The digital avatar can be understood as a virtual representation of our digital selves and may serve as a potential proxy for an actual person. This construction may be enabled through processes such as the data fusion of biometric and biographic data, or the digital data fusion of the …


Back Matter, 2015 Embry-Riddle Aeronautical University

Back Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Masthead, 2015 Embry-Riddle Aeronautical University

Masthead

Journal of Digital Forensics, Security and Law

No abstract provided.


Front Matter, 2015 Embry-Riddle Aeronautical University

Front Matter

Journal of Digital Forensics, Security and Law

No abstract provided.


Children Of Internet Era: A Critical Analysis Of Vulnerability Of Children In The Darker Sides Of Social Media And Whatsapp, Debarati Halder Dr. 2015 NLSIU, Bangalore, Karnataka, India

Children Of Internet Era: A Critical Analysis Of Vulnerability Of Children In The Darker Sides Of Social Media And Whatsapp, Debarati Halder Dr.

Debarati Halder

Information communication technology has been made an essential part of school curriculums in India today. As per the guidelines of the, National Policy on Information and Communication technology (ICT) in school education, children must be taught the positive usage of the internet, the computer technology and digital communication technology. But internet is a double edged weapon: if it is used positively, it may yield positive results, if it is used negatively, it can create large scale devastation. It has been seen that children are often misusing the information communication technology. In the present age, children are growing up seeing their …


Aaron's Law: Reactionary Legislation In The Guise Of Justice, Matthew Aaron Viana 2015 University of Massachusetts School of Law

Aaron's Law: Reactionary Legislation In The Guise Of Justice, Matthew Aaron Viana

University of Massachusetts Law Review

This Note argues that the proposed amendment to the Computer Fraud and Abuse Act dubbed “Aaron’s Law,” created in the wake of the prosecution and subsequent suicide of hacktivist Aaron Swartz, should not be enacted as it is overly reactionary legislation which would have unfortunate and unjust repercussions in the realm of civil litigation. This Note first describes the circumstances under which Mr. Swartz found himself prosecuted under the Computer Fraud and Abuse Act, namely his intrusion into, and downloading massive amounts of data from, large internet databases like PACER and JSTOR. This Note also explores the disputed interpretation of …


Information Technology And The Law - Trademarks In Cyberspace, Macerata 2015, Ulf Maunsbach 2015 Lund University, Faculty of Law

Information Technology And The Law - Trademarks In Cyberspace, Macerata 2015, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta 2015 Atlanta's John Marshall Law School

, The Law School Of The Future: How The Synergies Of Convergence Will Transform The Very Notion Of “Law Schools” During The 21st Century From “Places” To “Platforms”, Jeffrey A. Van Detta

Jeffrey A. Van Detta

This article discusses the disruptive change in American (and trans-national) legal education that the convergence of technology and economics is bringing to legal education. It posits, and then defends, the following assertion about "law schools of the future":

“Law schools will no longer be ‘places’ in the sense of a single faculty located on a physical campus. In the future, law schools will consist of an array of technologies and instructional techniques brought to bear, in convergence, on particular educational needs and problems.”

This paper elaborates on that prediction, discussing the ways in which technology will positively impact legal education, …


The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan 2015 University of Illinois at Chicago

The Self, The Stasi, The Nsa: Privacy, Knowledge, And Complicity In The Surveillance State, Richard Warner, Robert H. Sloan

Richard Warner

We focus on privacy in public. The notion dates back over a century, at least to the work of the German sociologist, Georg Simmel. Simmel observed that people voluntarily limit their knowledge of each other as they interact in a wide variety of social and commercial roles, thereby making certain information private relative to the interaction even if it is otherwise publicly available. Current governmental surveillance in the US (and elsewhere) reduces privacy in public. But to what extent?

The question matters because adequate self-realization requires adequate privacy in public. That in turn depends on informational norms, social norms that …


The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan 2015 University of Georgia School of Law

The "Uberization" Of Healthcare: The Forthcoming Legal Storm Over Mobile Health Technology's Impact On The Medical Profession, Fazal Khan

Fazal Khan

The nascent field of mobile health technology is still very small but is predicted to grow exponentially as major technology companies such as Apple, Google, Samsung, and even Facebook have announced mobile health initiatives alongside influential healthcare provider networks. Given the highly regulated nature of healthcare, significant legal barriers stand in the way of mobile health’s potential ascension. I contend that the most difficult legal challenges facing this industry will be restrictive professional licensing and scope of practice laws. The primary reason is that mobile health threatens to disrupt historical power dynamics within the healthcare profession that have legally enshrined …


Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, Sarah Reis 2015 Northwestern Pritzker School of Law

Toward A "Digital Transfer Doctrine"? The First Sale Doctrine In The Digital Era, Sarah Reis

Northwestern University Law Review

The first sale doctrine in copyright law allows a person who owns a copy of a copyrighted work to sell, lend, or give away the copy to someone else. An owner of a copy of a copyrighted work can take advantage of the first sale doctrine, but a licensee cannot. In today’s digital environment, people are increasingly purchasing digital music files and e-books instead of CDs and physical books. Customers often mistakenly believe they become owners of the digital content they purchase when in actuality they merely become licensees most of the time. Licensing agreements impose use restrictions on digital …


Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb 2015 University of Michigan Law School

Installation Failure: How The Predominant Purpose Test Has Perpetuated Software’S Uncertain Legal Status Under The Uniform Commercial Code, Spencer Gottlieb

Michigan Law Review

Courts have struggled to uniformly classify software as a good or a service and have consequently failed to apply a consistent body of law in that domain. Instead, courts have relied on the predominant purpose test to determine whether the Uniform Commercial Code (“UCC”) or common law should apply to a given software contract. This test, designed for traditional goods and services that do not share software’s complexity or rapid advancement, has perpetuated the uncertainty surrounding software’s legal status. This Note proposes that courts adopt the substantial software test as an alternative to the predominant purpose test. Under this proposal, …


Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman 2015 Author, Educator, Entrepreneur & Professional Corporate Director

Cybersecurity: What About U.S. Policy?, Lawrence J. Trautman

Lawrence J. Trautman Sr.

During December 2014, just hours before the holiday recess, the U.S. Congress passed five major legislative proposals designed to enhance U.S. cybersecurity. Following signature by the President, these became the first cybersecurity laws to be enacted in over a decade, since passage of the Federal Information Security Management Act of 2002. My goal is to explore the unusually complex subject of cybersecurity policy in a highly readable manner. An analogy with the recent deadly and global Ebola epidemic is used to illustrate policy challenges, and hopefully will assist in transforming the technological language of cybersecurity into a more easily understandable …


Information Technology And The Law - An Overview Of Issues, Ulf Maunsbach 2015 Lund University, Faculty of Law

Information Technology And The Law - An Overview Of Issues, Ulf Maunsbach

Ulf Maunsbach

No abstract provided.


Net Neutrality - Computer Law, Matthew Charles Quattrochi 2015 Barry University

Net Neutrality - Computer Law, Matthew Charles Quattrochi

Matthew Charles Quattrochi

The overall purpose of this work is to discuss the current state of net neutrality. Given Federal Communication Commission (“FCC”) Chairman Tom Wheeler’s most recent proposal to pass net neutrality into law, net neutrality is ripe for discussion.The court ruling striking down the infrastructure of the Open Internet Order in Verizon v. F.C.C., and the devaluation of Title I regulatory authority exhibited in the decision made in Comcast Corp. v. F.C.C. bring about an appropriate point to stop and reflect concerning the options the FCC has to instill net neutrality regulation.Part II of this work will be dedicated to explaining …


Intersection Of “Tokku” Special Zone, Robots, And The Law: A Case Study On Legal Impacts To Humanoid Robots, Yueh-Hsuan Weng, Yusuke Sugahara, Kenji Hashimoto, Atsuo Takanishi 2015 Peking University

Intersection Of “Tokku” Special Zone, Robots, And The Law: A Case Study On Legal Impacts To Humanoid Robots, Yueh-Hsuan Weng, Yusuke Sugahara, Kenji Hashimoto, Atsuo Takanishi

Yueh-Hsuan Weng

The unique “Tokku” Special Zone for Robotics Empirical Testing and Development (RT special zone) originated in Japan. Since 2003, the world’s first RT special zone had already established in Fukuoka Prefecture, Fukuoka City and Kitakyushu City. At that time, Takanishi Laboratory, Humanoid Robotics Institute of Waseda University had conducted many empirical testing within several different spots of the special zone to evaluate the feasibility for bipedal humanoid robots on public roads from 2004 to 2007. It is also known as the world’s first public roads testing for bipedal robots. The history of RT special zone is merely 10 years long, …


Digital Commons powered by bepress