Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (38)
- Fordham Law School (17)
- Schulich School of Law, Dalhousie University (13)
- Southern Methodist University (9)
- UIC School of Law (6)
-
- University of Oklahoma College of Law (5)
- University of Michigan Law School (4)
- Vanderbilt University Law School (4)
- St. Mary's University (3)
- University of Maine School of Law (3)
- University of Maryland Francis King Carey School of Law (3)
- Brooklyn Law School (2)
- Florida State University College of Law (2)
- Georgia State University College of Law (2)
- Loyola Marymount University and Loyola Law School (2)
- University of Richmond (2)
- Brigham Young University Law School (1)
- California State University, San Bernardino (1)
- Cornell University Law School (1)
- Maurer School of Law: Indiana University (1)
- Pace University (1)
- Seattle University School of Law (1)
- Seton Hall University (1)
- Universitas Indonesia (1)
- Keyword
-
- Criminal law; symposium; communications law; international law; first amendment (11)
- Privacy (7)
- Cybersecurity (4)
- Fourth Amendment (4)
- Technology (4)
-
- Cyber security (3)
- Digital forensics (3)
- Health care (3)
- Health records (3)
- Information (3)
- Information technology (3)
- Security (3)
- Algorithms (2)
- Big data (2)
- CSLI (2)
- Chain of custody (2)
- Cloud computing (2)
- Cyber attacks (2)
- Cyber terrorism (2)
- Cybercrime (2)
- Cyberspace (2)
- Dark web (2)
- Data (2)
- Data privacy (2)
- Data protection (2)
- Facebook (2)
- Food and Drug Administration (2)
- HIPAA (2)
- Hacking (2)
- Information privacy (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (38)
- Fordham Law Review (17)
- Canadian Journal of Law and Technology (13)
- SMU Science and Technology Law Review (9)
- Oklahoma Journal of Law and Technology (5)
-
- Maine Law Review (3)
- Maryland Law Review (3)
- UIC John Marshall Journal of Information Technology & Privacy Law (3)
- Vanderbilt Journal of Transnational Law (3)
- Brooklyn Law Review (2)
- Florida State University Law Review (2)
- Georgia State University Law Review (2)
- Loyola of Los Angeles Law Review (2)
- Michigan Law Review (2)
- St. Mary's Law Journal (2)
- UIC Review of Intellectual Property Law (2)
- University of Richmond Law Review (2)
- BYU Law Review (1)
- Cornell Law Review (1)
- Indiana Journal of Global Legal Studies (1)
- Journal of International Technology and Information Management (1)
- Jurnal Hukum & Pembangunan (1)
- Michigan Telecommunications & Technology Law Review (1)
- Pace Intellectual Property, Sports & Entertainment Law Forum (1)
- Seattle University Law Review (1)
- Seton Hall Circuit Review (1)
- St. Mary's Journal on Legal Malpractice & Ethics (1)
- UIC Law Review (1)
- University of Michigan Journal of Law Reform (1)
- Vanderbilt Journal of Entertainment & Technology Law (1)
Articles 31 - 60 of 123
Full-Text Articles in Law
Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz
Terror On Your Timeline: Criminalizing Terrorist Incitement On Social Media Through Doctrinal Shift, Zachary Leibowitz
Fordham Law Review
The United States faces a barrage of threats from terrorist organizations on a daily basis. The government takes some steps to prevent these threats from coming to fruition, but not much is being done proactively. Any person can log into a social media account to preach hate and incite violence against the United States and its citizenry, and sometimes these words result in action. When speakers are not held accountable, they can continue to incite the masses to violent action across the United States. This Note proposes a new incitement doctrine to prevent these speakers from being able to spread …
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
“You Must Construct Additional Pylons”: Building A Better Framework For Esports Governance, Laura L. Chao
Fordham Law Review
The popularity of “esports,” also known as “electronic sports” or competitive video gaming, has exploded in recent years and captured the attention of cord-cutting millennials—often to the detriment of sports such as basketball, football, baseball, and hockey. In the United States, the commercial dominance of such traditional sports stems from decades of regulatory support. Consequently, while esports regulation is likely to emulate many aspects of traditional sports governance, the esports industry is fraught with challenges that inhibit sophisticated ownership and capital investment. Domestic regulation is complicated by underlying intellectual property ownership and ancillary considerations such as fluctuations in a video …
Algorithmic Jim Crow, Margaret Hu
Algorithmic Jim Crow, Margaret Hu
Fordham Law Review
This Article contends that current immigration- and security-related vetting protocols risk promulgating an algorithmically driven form of Jim Crow. Under the “separate but equal” discrimination of a historic Jim Crow regime, state laws required mandatory separation and discrimination on the front end, while purportedly establishing equality on the back end. In contrast, an Algorithmic Jim Crow regime allows for “equal but separate” discrimination. Under Algorithmic Jim Crow, equal vetting and database screening of all citizens and noncitizens will make it appear that fairness and equality principles are preserved on the front end. Algorithmic Jim Crow, however, will enable discrimination on …
Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta
Guardians Of The Galaxy Of Personal Data: Assessing The Threat Of Big Data And Examining Potential Corporate And Governmental Solutions, Timothy A. Asta
Florida State University Law Review
No abstract provided.
Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita
Electronic Social Media: Friend Or Foe For Judges, M. Sue Kurita
St. Mary's Journal on Legal Malpractice & Ethics
The use of electronic social communication has grown at a phenomenal rate. Facebook, the most popular social networking website, has over 1,968,000,000 users—a number that has exponentially grown since its inception in 2004. The number of judges accessing and using electronic social media (ESM) has also increased. However, unlike the general population, judges must consider constitutional, ethical, technical, and evidentiary implications when they use and access ESM. The First Amendment forbids “abridging the freedom of speech” and protects the expression of personal ideas, positions, and views. However, the American Bar Association’s Model Code of Judicial Conduct and the Texas Code …
Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone
Health Information Technology, E-Prescribing And Hurricane Katrina: Could Electronic Health Records Have Made A Difference, Robert Malone
Oklahoma Journal of Law and Technology
No abstract provided.
Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone
Health Information Technology And Hipaa: Can We Satisfy Security And Privacy Standards In The Digital Age, Robert Malone
Oklahoma Journal of Law and Technology
No abstract provided.
Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone
Health Information Technology: Transforming The Healthcare Industry For The 21st Century, Robert Malone
Oklahoma Journal of Law and Technology
No abstract provided.
Toward A Direct Functional Relationship Requirement For Claims To Software Encoded On A Computer-Readable Storage Medium: Rethinking In Re Beauregard In Response To The Uspto's Interim Guidelines Regarding The Patentability Of Data Signal Claims, Elizabeth A. Richardson
Oklahoma Journal of Law and Technology
No abstract provided.
Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett
Terms Of Service And The Computer Fraud And Abuse Act: A Trap For The Unwary?, David A. Puckett
Oklahoma Journal of Law and Technology
No abstract provided.
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Analysis Of Security In Big Data Related To Healthcare, Isabel De La Torre, Begoña García-Zapirain, Miguel López-Coronado
Journal of Digital Forensics, Security and Law
Big data facilitates the processing and management of huge amounts of data. In health, the main information source is the electronic health record with others being the Internet and social media. Health-related data refers to storage in big data based on and shared via electronic means. Why are criminal organisations interested in this data? These organisations can blackmail people with information related to their health condition or sell the information to marketing companies, etc. This article analyses healthcare-related big data security and proposes different solutions. There are different techniques available to help preserve privacy such as data modification techniques, cryptographic …
The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich
The Use Of Information Technologies To Combat Counterfeit Alcohol Products And Ensure The Right To Life In Russia, Pavel Syosoevich Pastukhov, Svetlana Polyakova, Evelina Frolovich
Journal of Digital Forensics, Security and Law
The paper is aimed to analyze implementation of an integrated information system that provides forecasting, monitoring, prevention and elimination of possible threats, such as violation of information support of public authorities, businesses and municipal services and others as well as control of elimination of consequences of emergency situations and offenses with integration under its control action information and control duty subsystems, control, municipal services for their operational cooperation in the interests of of the municipality. In particular, it consideres how this unified system is applied in accounting of production volume and turnover of ethyl alcohol, alcoholic and alcohol-containing products (USAIS) …
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Possession Of Child Exploitation Material In Computer Temporary Internet Cache, Sungmi Park, Yunsik Jake Jang, Joshua I. James
Journal of Digital Forensics, Security and Law
When considering the possession of child exploitation material U.S. and German courts have the same focus, but slightly different interpretations. This slight difference in interpretation could mean that in one country a defendant will be found guilty of possession while in the other country he or she could be found not guilty. In this work we examine the standards courts in Germany and the United States have used to combat child pornography, and analyze the approaches specifically related to viewing and possession of CEM. A uniform solution is suggested that criminalizes “knowing access with the intention to view” as a …
What Would Grandma Say? How To Respond When Cyber Hackers Reveal Private Information To The Public, Jason P. Ottomano
What Would Grandma Say? How To Respond When Cyber Hackers Reveal Private Information To The Public, Jason P. Ottomano
Cornell Law Review
No abstract provided.
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Legislative Requirements For Cyber Peacekeeping, Nikolay Akatyev, Joshua I. James
Journal of Digital Forensics, Security and Law
Cyber Peacekeeping strives for the prevention, mitigation and cessation of cyber and physical conflicts. The creation of a Cyber Peacekeeping organization, however, has major legal and political implications. In this work we review current international legislation applicable for functions of Cyber Peacekeeping. Specifically, we analyze prominent works which contribute to definitions, law and ethics regulating cyber conflicts from the perspective of the creation of a CPK organization. Legislative and terminological foundations are analyzed and adopted from current practice. Further, this work analyzes guiding principles of global organizations such as ITU IMPACT, INTERPOL and regional organizations such as NATO and the …
Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio
Public Security & Digital Forensics In The United States: The Continued Need For Expanded Digital Systems For Security, Deborah G. Keeling, Michael Losavio
Journal of Digital Forensics, Security and Law
Digital Forensics is one of the latest challenges for the use of forensics in the investigative process in the United States. Some of the challenges are created by conditions and circumstances present for law enforcement around the world. However, many are unique to the United States and created by the standards of evidence within our courts, nature of our law enforcement organizations, and structure of our judicial and prosecutorial systems. It is essential for the preservation of public security and individual safety that competent systems of digital forensics are developed for law enforcement at all levels. The failure to do …
Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby
Security And The Transnational Information Polity, Michael M. Losavio, Adel Said Elmaghraby
Journal of Digital Forensics, Security and Law
Global information and communications technologies create criminal opportunities in which criminal violation and physical proximity are decoupled. As in all our endeavors, the good become the prey of the bad. Murderous and venal exploitation of ICT has followed from the inception of the Internet, threatening all the good it brings and the trust we need so badly as a people. As the work continues to expand the implementation of Smart Cities and the Internet of Things, there will be more opportunities for exploitation of these technologies. We examine the social and liberty risks our data and technology-driven responses may entail.
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm
Averting Robot Eyes, Margot E. Kaminski, Matthew Rueben, William D. Smart, Cindy M. Grimm
Maryland Law Review
No abstract provided.
Cyber!, Andrea M. Matwyshyn
Cyber!, Andrea M. Matwyshyn
BYU Law Review
This Article challenges the basic assumptions of the emerging legal area of “cyber” or “cybersecurity.” It argues that the two dominant “cybersecurity” paradigms—information sharing and deterrence—fail to recognize that corporate information security and national “cybersecurity” concerns are inextricable. This problem of “reciprocal security vulnerability” means that in practice our current legal paradigms channel us in suboptimal directions. Drawing insights from the work of philosopher of science Michael Polanyi, this Article identifies three flaws that pervade the academic and policy analysis of security, exacerbating the problem of reciprocal security vulnerability—privacy conflation, incommensurability, and internet exceptionalism. It then offers a new paradigm—reciprocal …
Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan
Reviving The Public Trustee Concept And Applying It To Information Privacy Policy, Priscilla M. Regan
Maryland Law Review
No abstract provided.
Penggunaan Prinsip De Minimis Pada Ciptaan Program Komputer Berdasarkan Undang-Undang No. 28 Tahun 2014 Tentang Hak Cipta, Kesuma Wardhana
Penggunaan Prinsip De Minimis Pada Ciptaan Program Komputer Berdasarkan Undang-Undang No. 28 Tahun 2014 Tentang Hak Cipta, Kesuma Wardhana
Jurnal Hukum & Pembangunan
Based on Indonesia’s current law, computer program is considered as a copyrightable works in accordance to Act No. 28/2014, which has accommodated computer program as a unique works that needs its own kind of protection. The act in question, unfortunately, is far from perfect, and has its own shortcomings, particularly because it doesn’t regulate nor state what elements it’s supposed to protect. This research therefor hopes to create boundaries and approaches that can be used both on a copyright infringement cases and to create a better legislation concerning the protection of computer program by the use of the de minimis …
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Sql Injection: The Longest Running Sequel In Programming History, Matthew Horner, Thomas Hyslip
Journal of Digital Forensics, Security and Law
One of the risks to a company operating a public-facing website with a Structure Query Language (SQL) database is an attacker exploiting the SQL injection vulnerability. An attacker can cause an SQL database to perform actions that the developer did not intend like revealing, modifying, or deleting sensitive data. This can cause a loss of confidentiality, integrity, and availability of information in a company’s database, and it can lead to severe costs of up to $196,000 per successful injection attack (NTT Group, 2014). This paper discusses the history of the SQL injection vulnerability, focusing on:
- How an attacker can exploit …
Protecting Digital Evidence Integrity And Preserving Chain Of Custody, Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, Roha Zulqarnain
Protecting Digital Evidence Integrity And Preserving Chain Of Custody, Makhdoom Syed Muhammad Baqir Shah, Shahzad Saleem, Roha Zulqarnain
Journal of Digital Forensics, Security and Law
Evidence is the key to solve any crime. Evidence integrity needs to be protected in order to make it admissible in the court of law. Digital evidence is more revealing, but it is fragile; it can easily be tampered with or modified. There are different techniques available to protect the integrity of digital evidence. Different automated digital evidence acquisition tools are available in the market. In this paper, we have analyzed two automated tools (EnCase and FTK Imager) that are used for disk imaging. These tools claim to protect the integrity of digital evidence. The techniques used by these tools …
Table Of Contents
Journal of Digital Forensics, Security and Law
No abstract provided.