Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Law

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo Apr 2015

Cloud Computing, Contractibility, And Network Architecture, Christopher S. Yoo

All Faculty Scholarship

The emergence of the cloud is heightening the demands on the network in terms of bandwidth, ubiquity, reliability, latency, and route control. Unfortunately, the current architecture was not designed to offer full support for all of these services or to permit money to flow through it. Instead of modifying or adding specific services, the architecture could redesigned to make Internet services contractible by making the relevant information associated with these services both observable and verifiable. Indeed, several on-going research programs are exploring such strategies, including the NSF’s NEBULA, eXpressive Internet Architecture (XIA), ChoiceNet, and the IEEE’s Intercloud projects.


A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo Jan 2015

A Market-Oriented Analysis Of The 'Terminating Access Monopoly' Concept, Jonathan E. Nuechterlein, Christopher S. Yoo

All Faculty Scholarship

Policymakers have long invoked the concept of a “terminating access monopoly” to inform communications policy. Roughly speaking, the concept holds that a consumer-facing network provider, no matter how small or how subject to retail competition, generally possesses monopoly power vis-à-vis third-party senders of communications traffic to its customers. Regulators and advocates have routinely cited that concern to justify regulatory intervention in a variety of contexts where the regulated party may or may not have possessed market power in any relevant retail market.

Despite the centrality of the terminating access monopoly to modern communications policy, there is surprisingly little academic literature …


Politics By Number: Indicators As Social Pressure In International Relations, Judith Kelley, Beth A. Simmons Jan 2015

Politics By Number: Indicators As Social Pressure In International Relations, Judith Kelley, Beth A. Simmons

All Faculty Scholarship

The ability to monitor state behavior has become a critical tool of international governance. Systematic monitoring allows for the creation of numerical indicators that can be used to rank, compare and essentially censure states. This article argues that the ability to disseminate such numerical indicators widely and instantly constitutes an exercise of social power, with the potential to change important policy outputs. It explores this argument in the context of the United States’ efforts to combat trafficking in persons and find evidence that monitoring has important effects: countries are more likely to criminalize human trafficking when they are included in …


Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyber War?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

All Faculty Scholarship

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by …


Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl Jan 2015

Making "Friends" With The #Ethics Rules: Avoiding Pitfalls In Professional Social Media Use, Cynthia Laury Dahl

All Faculty Scholarship

Lawyers’ professional use of social media is widespread and a critical component to running a successful practice. Yet some common uses of social media easily – and often innocently -- violate the professional rules of ethics. The American Bar Association recently passed amendments to the Model Rules of Professional Conduct to include topics related to social media use, but the amendments still do not address all issues. Likewise, advisory opinions of state and local bar associations and court opinions give scant and sometimes contradictory advice about when a use does or does not violate a Rule. This essay discusses four …


Empowering Employees To Prevent Fraud In Nonprofit Organizations, John M. Bradley Jan 2015

Empowering Employees To Prevent Fraud In Nonprofit Organizations, John M. Bradley

All Faculty Scholarship

This Article examines the significant problem of fraud within nonprofit organizations and demonstrates that current anti-fraud measures do not adequately reflect the important role employees play in perpetuating or stopping fraudulent activity. Psychological and organizational behavior studies have established the importance of (1) participation and (2) peers in shaping the behavior of individuals within the organizational context. This Article builds on that research and establishes that to successfully combat fraud, organizations must integrate employees into the design, implementation, and enforcement of anti-fraud strategy and procedures. Engaged, empowered employees will be less likely to commit fraud and more likely to dissuade …