Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Criminal Procedure

PDF

BLR

Science and Technology

Publication Year

Articles 1 - 9 of 9

Full-Text Articles in Law

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski Jan 2007

Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski

ExpressO

This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.

Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.

Awareness of the risks of cybercrime …


A Complete Property Right Amendment, John H. Ryskamp Oct 2006

A Complete Property Right Amendment, John H. Ryskamp

ExpressO

The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.


Technoconsen(T)Sus, Andrea M. Matwyshyn Aug 2006

Technoconsen(T)Sus, Andrea M. Matwyshyn

ExpressO

Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …


Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp Jun 2006

Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp

ExpressO

This brief comment suggests where the anti-eminent domain movement might be heading next.


The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh Apr 2006

The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh

ExpressO

In the article, I discuss the potential use of public opinion polls to measure the discriminatory effect of certain questions in jury selection. While the laws surrounding race and gender based jury selection are known to most lawyers, there has been little scrutiny on questions that might be posed to potential jurors that are facially neutral, yet have a discriminatory impact. This article examines a number of such questions and offers a statistical test to determine whether a proposed question has, in fact, a 98% certainty of having a discriminatory effect if relied upon in jury selection.


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Nov 2005

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

ExpressO

This is a discussion of the legal and economic ramifications of password theft.


On The Potential Of Neuroscience: A Comment On Greene And Cohen’S "For The Law, Neuroscience Changes Nothing And Everything", Theodore Y. Blumoff Oct 2005

On The Potential Of Neuroscience: A Comment On Greene And Cohen’S "For The Law, Neuroscience Changes Nothing And Everything", Theodore Y. Blumoff

ExpressO

In a recent article, Joshua Greene and Jonathan Cohen add their voices to an emerging discussion about the place of neuroscience in law and social policy. They argue convincingly that new data from the developing field of neuroscience will dramatically and positively change our legal system. I agree with their conclusions, but I believe that their commitment to a kind of neuroscientific determinism or essentialism is wrong, unnecessary, and even dangerous; it would move law in a direction that eliminates ongoing, normative decision-making. In the essay I have attached, I first set the stage by discussing the commitment of our …


Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor Sep 2005

Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor

ExpressO

No abstract provided.


National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock Oct 2003

National Identity Cards: Fourth And Fifth Amendment Issues, Daniel J. Steinbock

ExpressO

In the past two years there have been serious calls for a national identity system whose centerpiece would be some form of national identity card. Such a system is seen mainly as a tool against terrorists, but also as a useful response to illegal immigration, identity theft, and electoral fraud. Both proponents and opponents have noted the potential constitutional problems of such an identity system, but as yet there has been no published legal analysis of these questions. This article aims to fill that gap by analyzing the Fourth and Fifth Amendment issues in two major features of any likely …