Open Access. Powered by Scholars. Published by Universities.®

Internet Law Commons

Open Access. Powered by Scholars. Published by Universities.®

3958 Full-Text Articles 3124 Authors 1811991 Downloads 97 Institutions

All Articles in Internet Law

Faceted Search

3958 full-text articles. Page 1 of 102.

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung HUI, Seung Hyun KIM, QIU-HONG WANG 2017 Singapore Management University

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by ...


Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik 2017 Boston College Law School

Enjoying Your "Free" App? The First Circuit's Approach To An Outdated Law In Yershov V. Gannett Satellite Information Network, Inc., Wendy Beylik

Boston College Law Review

On April 29, 2016, in Yershov v. Gannett Satellite Information Network, Inc. (“Yershov II”), the U.S. Court of Appeals for the First Circuit held that the Video Privacy Protection Act (“VPPA”) of 1988 extended to a free application provider who disclosed its users’ GPS coordinates, phone identification numbers, and video histories to a data analytics company. In a similar case, the U.S. Court of Appeals for the Eleventh Circuit held that the VPPA did not apply because the relationship was too weak to render the user a “subscriber” under the Act. The U.S. Court of Appeals for ...


Too Much Information!: The Need For Stronger Privacy Protection For The Online Activities Of Employees And Applicants, Ralph Carter 2017 St. John's University School of Law

Too Much Information!: The Need For Stronger Privacy Protection For The Online Activities Of Employees And Applicants, Ralph Carter

Journal of Civil Rights and Economic Development

No abstract provided.


Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green 2017 Boston College Law School

Standing In The Future: The Case For A Substantial Risk Theory Of "Injury-In-Fact" In Consumer Data Breach Class Actions, Nicholas Green

Boston College Law Review

The increasing digitalization of our personal and professional lives has generated corresponding growth in the amount of electronically stored private information in the hands of third parties. That private information is at risk of theft, loss, or manipulation. Employers that hold employee tax information and merchants that hold significant troves of consumer credit card data are particularly attractive targets. When hackers strike, victims often band together in federal class actions, naming the custodians of their private data as defendants. More and more, however, district courts are dismissing these class action claims at the doorstep for lack of Article III standing ...


Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell 2017 Georgetown University Law Center

Rethinking Children's Advertising Policies For The Digital Age, Angela J. Campbell

Georgetown Law Faculty Publications and Other Works

This article describes major changes in how video content and advertising is delivered to consumers. Digital technologies such as broadband allow consumers to stream or download programming. Smart phones and tablets allow consumers to view screen content virtually anywhere at any time. Advertising has become personalized and integrated with other content.

Despite these major changes in the media markets, the framework for regulating advertising to children has not changed very much since the 1990s. This article argues that the existing regulatory framework must be reinvented to protect children in the digital age. It uses Google’s recently introduced YouTube Kids ...


Against Data Exceptionalism, Andrew Keane Woods 2017 University of Kentucky, College of Law

Against Data Exceptionalism, Andrew Keane Woods

Andrew Keane Woods

One of the great regulatory challenges of the Internet era—indeed, one of today's most pressing privacy questions—is how to define the limits of government access to personal data stored in the cloud. This is particularly true today because the cloud has gone global, raising a number of questions about the proper reach of one state's authority over cloud-based data. The prevailing response to these questions by scholars, practitioners, and major Internet companies like Google and Facebook has been to argue that data is different. Data is “unterritorial,” they argue, and therefore incompatible with existing territorial notions ...


Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen 2017 Elisabeth Haub School of Law at Pace University

Scientists & Librarians Turn To “End Of Presidential Term” Web Archive To Safeguard Climate Change Data, Alyssa S. Rosen

Pace Law Faculty Publications

In anticipation of president-elect Donald Trump’s taking office, scientists have been working round the clock to safeguard federal government climate change data. Many academics and librarians share the concern that federal .gov climate data and information, for example from the EPA and NOAA websites, will be lost or become unavailable with the transition to the new administration. Fact is, a large percentage of information on federal government servers, including digital federal records, reports, and research, is not protected by any law or agency mandate, and can vanish within days of the arrival of a new president.


Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton 2017 Laton & Strain LLC

Manhattan_Project.Exe: A Nuclear Option For The Digital Age, David Laton

Catholic University Journal of Law and Technology

This article explores the possible implications and consequences arising from the use of an artificial intelligence construct as a weapon of mass destruction. The digital age has ushered in many technological advances, as well as certain dangers. Chief among these pitfalls is the lack of reliable security found in critical information technology systems. These security gaps can give cybercriminals unauthorized access to highly sensitive computer networks that control the very infrastructure of the United States. Cyberattacks are rising in both frequency and severity and the response by the U.S. has been ineffective. A cyber-weapon of mass destruction (CWMD) implementing ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti 2017 Holland & Knight LLP

Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti

Catholic University Journal of Law and Technology

No abstract provided.


Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano 2017 Williams Mullen

Telecommunications Infrastructure: Another O-Ring In The Economic Development Of The Third World, James Germano

Catholic University Journal of Law and Technology

No abstract provided.


How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs 2017 The Catholic University of America, Columbus School of Law

How Many Likes Did It Get? Using Social Media Metrics To Establish Trademark Rights, Caroline Mrohs

Catholic University Journal of Law and Technology

This comment asserts that there is a need for an update to the multifactor test considered by courts in determining the strength of a trademark. Traditional factors include the expenses an entity can afford to pay in advertising, but do not give any weight to the presence of the entity on social media to reach its target consumer group.


Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones 2017 Catholic University of America (Student)

Autonomous Cars: Navigating The Patchwork Of Data Privacy Laws That Could Impact The Industry, Anthony Jones

Catholic University Journal of Law and Technology

No abstract provided.


Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin 2017 Catholic University of America (Student)

Is Wifi Worth It: The Hidden Dangers Of Public Wifi, Ellie Shahin

Catholic University Journal of Law and Technology

No abstract provided.


Table Of Contents, 2017 The Catholic University of America, Columbus School of Law

Table Of Contents

Catholic University Journal of Law and Technology

No abstract provided.


Masthead, 2017 The Catholic University of America, Columbus School of Law

Masthead

Catholic University Journal of Law and Technology

No abstract provided.


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney 2017 John Marshall Law School

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, Raizel Liebler, Keidra Chaney

Keidra Chaney

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...


Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney 2017 Selected Works

Google Analytics: Analyzing The Latest Wave Of Legal Concerns For Google In The U.S. And The E.U., 7 Buff. Intell. Prop. L.J. 135 (2010), Raizel Liebler, Keidra Chaney

Keidra Chaney

The next wave of concern regarding Google involves web analytics. Web analytics is the measurement, collection, analysis, and reporting of Internet data for the purposes of understanding and optimizing web usage. The concerns of web analytics use touches on issues of online user privacy, government use of personal information, and information on website user activity. While Google Analytics is not the sole web analytics product on the market, it is widely used by corporate, non-profit, and government organizations. The product has been reported to have a 59% market share among web analytics vendors in a 2008 study. Web analytics technology ...


Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney 2017 Selected Works

Here We Are Now, Entertain Us: Defining The Line Between Personal And Professional Context On Social Media, 35 Pace L. Rev. 398 (2014), Raizel Liebler, Keidra Chaney

Keidra Chaney

Social media platforms such as Facebook, Twitter, and Instagram allow individuals and companies to connect directly and regularly with an audience of peers or with the public at large. These websites combine the audience-building platforms of mass media with the personal data and relationships of in-person social networks. Due to a combination of evolving user activity and frequent updates to functionality and user features, social media tools blur the line of whether a speaker is perceived as speaking to a specific and presumed private audience, a public expression of one’s own personal views, or a representative viewpoint of an ...


Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. McKenna 2017 Penn State Law

Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna

Anne T. McKenna

No abstract provided.


Digital Commons powered by bepress