Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Internet Law

Theses/Dissertations

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 33

Full-Text Articles in Law

Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse May 2023

Cuban Embargo: An Insufficient Measure To Encourage Us Foreign Policy Interests, Esme Jm Prowse

Major Papers

This major paper examines the Cuban embargo as an ineffective hard power policy and explores the potential of soft, hard, and smart power as alternative approaches to resolve the failures of the 60-year-old blockade. The paper analyzes the historical context and rationale behind the embargo and assesses its impact on Cuban-American relations, regional stability, and U.S. national interests. The study argues that the embargo has failed to achieve its intended goals and has instead perpetuated a cycle of hostility, isolation, and human rights abuses. By drawing on the theoretical frameworks of soft, hard, and smart power, the paper presents policy …


The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman Apr 2023

The Exigency And How To Improve And Implement International Humanitarian Legislations More Advantageously In Times Of Both Cyber-Warfare And Cyberspace, Shawn J. Lalman

Doctoral Dissertations and Master's Theses

This study provides a synopsis of the following topics: the prospective limiters levied on cyber-warfare by present–day international legislation; significant complexities and contentions brought up in the rendering & utilization of International Humanitarian Legislation against cyber-warfare; feasible repercussions of cyber-warfare on humanitarian causes. It is also to be contended and outlined in this research study that non–state actors can be held accountable for breaches of international humanitarian legislation committed using cyber–ordnance if sufficient resources and skill are made available. It details the factors that prosecutors and investigators must take into account when organizing investigations into major breaches of humanitarian legislation …


Revenge Porn: The Result Of A Lack Of Privacy In An Internet-Based Society, Shelbie M. Mora Oct 2022

Revenge Porn: The Result Of A Lack Of Privacy In An Internet-Based Society, Shelbie M. Mora

Privacy Certificate Student Publications

This paper is about revenge porn statutes within and outside of the United States and their privacy consequences to victims. This paper focuses heavily on two state laws and reviews a case in each state and then explains the implications the ruling has on victims. With other countries' statutes, the paper primarily focuses on penalties for violations. To finish, there is a review of a failed proposed US statute and then I propose my own law and penalties.


Leaning Into Chaos (Child's Health And Online Safety Act): Revision To Ftc's Enforcement Of Coppa & New Model Rule For Child Advertising, Gabrielle N. Schwartz Sep 2022

Leaning Into Chaos (Child's Health And Online Safety Act): Revision To Ftc's Enforcement Of Coppa & New Model Rule For Child Advertising, Gabrielle N. Schwartz

Privacy Certificate Student Publications

This article focuses on the need for a new model act introduced by the author (the Child’s Health and Online Safety Act) to amend the Child’s Online Privacy Protection Rule. First, to understand the landscape of existing child privacy protections, this article discusses the historical background of the Federal Trade Commission’s (FTC’s) authority to regulate child advertising. Furthermore, this article illustrates how the current law, the Children’s Online Privacy Protection Rule (COPPA), regulates entities who direct their websites or online services and advertising to children. Next, this article introduces case law that illustrates the weaknesses of COPPA. Finally, the focus …


The Economic Impact Of Cyberattacks In The United States, Habibullah Asadi Aug 2022

The Economic Impact Of Cyberattacks In The United States, Habibullah Asadi

Student Theses

In recent years, the global economy has been beset by cyber-attacks. These events disrupt business and governmental operations, large and small, and include broad-horizon attacks on infrastructure and pointed network takeovers. The attacks can include malicious online activities directed at stealing financial and intellectual property or, manipulating, destroying, and denying access to critical information. Despite increased awareness of these challenges, the victimization of private and public networks continues, and the economic impacts mount daily. This research will present the economic impact of cyberattacks on United States businesses and governmental agencies.


Free Speech And Its Limits: An Exploration Of Tolerance In The Digital Age, Jamie Forte May 2022

Free Speech And Its Limits: An Exploration Of Tolerance In The Digital Age, Jamie Forte

Undergraduate Honors Theses

Humans have made remarkable strides in protecting and preserving free speech despite an overwhelming historical legacy of censorship and suppression of dissent. Given that history makes clear how easy it is to slide into authoritarianism and sacrifice our rights in the name of security, and given that we find ourselves frequently facing the temptation to do so, this is not an unreasonable position. If the United States is one of the few bastions of free speech in an otherwise unfree world, then we must defend this freedom vehemently, or so the argument goes. While this position is not an unreasonable …


Data Privacy Regulations In The United States, China, And The European Union, Charlsey A. Kelly Apr 2022

Data Privacy Regulations In The United States, China, And The European Union, Charlsey A. Kelly

Honors College Theses

This paper compares and discusses the different data privacy regulations found in the United States, China, and the European Union. It is no secret that big tech companies like Facebook and Google continuously collect data on their users. The big question is what protections and rights one has as a consumer. The answer to this question differs when you are in different parts of the world. Currently the United States does not have a federal data privacy law, China recently adopted a new data privacy law called the Personal Information Protection Law, and the European Union has a data privacy …


Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu Apr 2022

Cybercrimes And The Rule Of Law In West-Africa: The Republic Of Cote D’Ivoire As A Case-Study., John N. Adu

Theses and Dissertations

Since becoming independent nations in the 60s, West-African countries have enacted laws and regulations with the goals of ensuring peace and justice within their respective borders. On the paper, there was no difference between the justice systems of those newly independent nations and the justice systems of their former masters.

Unfortunately, the rule of law in West-African nations since gaining independence, has not always been followed for a myriad of social, cultural, political, and economic reasons. Most justice systems in West-Africa including in Cote d’Ivoire are deeply corrupted, thus rendering the goal of a peaceful society through a fair justice …


The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe Feb 2022

The Legal And Regulatory Aspect Of International Cybercrime And Cybersecurity: Limits And Challenges, Nnesochi Nweze-Iloekwe

Theses and Dissertations

The development of the internet and digital technologies represent a major opportunity for humanity in transforming businesses and providing new tools for everyday communication. Internet users are spending increasing amounts of time online and undertaking a greater range of online and social networking activities. However, just like a double edged sword, the internet also presents opportunities to cybercrimes in the Information society. The nature of some ‘traditional’ crime types has been transformed by the use of computers and other information communications technology (ICT) in terms of its scale and reach, with risks extending to many aspects of social life, such …


Sex, Money, And Free Speech: The Many Harms Of Fosta/Sesta, Desmond Mantle Jan 2022

Sex, Money, And Free Speech: The Many Harms Of Fosta/Sesta, Desmond Mantle

CMC Senior Theses

This thesis tracks the development of the Fight Online Sex Trafficking Act/Stop Enabling Sex Traffickers Act, or FOSTA/SESTA, which became federal law in 2018. The law's passage followed as a natural consequence of popular concerns about human trafficking. Congress passed the legislation by large margins in both houses given bipartisan opposition to sex trafficking. This thesis identifies plausible reasons for the only two Senate votes against the bill: those of Senators Rand Paul and Ron Wyden. Though these senators came from opposite sides of the aisle, they shared concerns about the future of free speech online and the potential failure …


Cyber-Gezi: How The 2013 Taksim Gezi Park Protests In Istanbul Subverted Historical Neoliberal Domination, Violence, And Revealed President Reccep Tayyip Erdoğan’S Repressive Cyber-Authoritarian Goals, Joseph John Nadler Jan 2022

Cyber-Gezi: How The 2013 Taksim Gezi Park Protests In Istanbul Subverted Historical Neoliberal Domination, Violence, And Revealed President Reccep Tayyip Erdoğan’S Repressive Cyber-Authoritarian Goals, Joseph John Nadler

Senior Projects Spring 2022

My project is organized around the 2013 Gezi Park protests, and the political, cybernetic, and cyberspatial developments that followed them. My argument is that through cybernetic, political, and legal means, President Erdogan of Turkey has failed to present alternatives to the Turkish people which would positively answer their expressed desires for change. My research method is one of comparison and analysis, as well as referring to virtual images by which I hope to provide a visual representation of models used to explain cybernetic expressions of power organization, communication, and expression. My project will hope to explain how internet users in …


Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight Jan 2022

Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight

Theses and Dissertations (Comprehensive)

In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …


Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo Aug 2021

Personal Data Privacy And Protective Federal Legislation: An Exploration Of Constituent Position On The Need For Legislation To Control Data Reliant Organizations Collecting And Monetizing Internet-Obtained Personal Data, Giovanni De Meo

Dissertations

In the past twenty years, the business of online personal data collection has grown at the same rapid pace as the internet itself, fostering a multibillion-dollar personal data collection and commercialization industry. Unlike many other large industries, there has been no major federal legislation enacted to monitor or control the activities of organizations dealing in this flourishing industry. The combination of these factors together with the lack of prior research encouraged this research designed to understand how much voters know about this topic and whether there is interest in seeing legislation enacted to protect individual personal data privacy.

To address …


The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White May 2020

The Cost Of Big Data: Evaluating The Effects Of The European Union’S General Data Protection Regulation, Kara Rebecca White

Chancellor’s Honors Program Projects

No abstract provided.


Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin Jan 2020

Internet Jurisdiction: Using Content Delivery Networks To Ascertain Intention, Patrick Lin

LL.M. Essays & Theses

Specific jurisdiction in civil litigation centers on the rather general,yet immutable, concept of intention. Although the word “intention” does not surface prominently in the personal jurisdiction case law, it is clearly intrinsic to the concept of “purposeful availment”. On the Internet, however, intention is hard to ascertain: how does a court, for example, determine whether the defendant intended that its website, application, or advertisement within a mobile application should end up in the forum state? In answering such a question, courts have historically used one of two approaches to establish intent: (i) a targeting test or (ii) a degree of …


Análisis De La Implementación De La Factura Electrónica En Colombia Como Mecanismo De Control Al Fraude Fiscal, Carlos Alberto Palacio Ospina Jan 2019

Análisis De La Implementación De La Factura Electrónica En Colombia Como Mecanismo De Control Al Fraude Fiscal, Carlos Alberto Palacio Ospina

Contaduría Pública

El presente documento tiene como intención determinar si la implementación de la factura electrónica en Colombia puede llegar a ser un eficiente mecanismo de control fiscal que permita disminuir los índices de evasión que tiene el país. Para lograr este objetivo se realizó un análisis a la evolución histórica del sistema tributario colombiano, con el fin de contextualizar y evidenciar las causas del fraude fiscal. Igualmente, los niveles de evasión fiscal en Colombia fueron documentados en cifras y estadísticas, comparadas con las de otros países de la región. Se analizó también cómo ésta problemática afecta a las finanzas públicas. Luego, …


An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh Apr 2018

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh

Electronic Theses and Dissertations

Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:

  • Discussion and Dialogue

  • Research

  • Confidence Building Measures

  • Incident Response

  • Crime …


Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan May 2017

Towards An Effective Regime Against Online Copyright Infringement In India, Ashwin Ramakrishnan

LLM Theses

With Internet usage on the rise, it is important for India to establish an effective regulatory regime to combat piracy and mass copyright infringement online. This thesis argues that, in the face of unique legal and cultural challenges specific to India, present laws in the country have failed to do so. Unless and until these challenges are met it will be difficult to have an effective mechanism that deals with online copyright infringement. Countries like the United States, Canada, Ireland, and France have all adopted different regulatory models. However, this thesis argues that each not only have significant limitations on …


Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak Jan 2017

Source, Character And Taxable Presence In A Digital World: International Taxation Of Online Advertising, Assaf Prussak

SJD Dissertations

The purpose of this dissertation is to examine the application of the U.S. and international tax rules and norms to income derived from online advertising, to consider the challenges and problems that arise when these rules are applied to such a purely-digital type of income, to propose an alternative framework for the taxation of online advertising, and to discuss the legislative measures adopted by various countries in an attempt to tax this type of income (and other income derived from digital-based activities).


Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor Jan 2017

Strategies And Behaviors Of Cyber Deviance And Internet Trolling, Cody Taylor

All Master's Theses

As society shifts towards making social media a center focus of contemporary life, trolls, are continually developing distractive dialogue. Although trolls may not be deviant in the sense of harsh online crimes, trolls do cause problems within online communities. Jonathan Bishop (2014) and Whitney Phillips (2015) have developed a foundation of internet troll research. Bishop (2014) studied the behaviors of trolls, while Philips (2015) investigated their techniques. However, neither researcher sampled from an online massive multiplayer Online game. Using one of the largest online gaming communities, World of Warcraft, this research examines the techniques and behaviors of trolling. Trolling was …


Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray Jan 2016

Anonymity, Cybercrime, And The Connection To Cryptocurrency, Jesse D. Bray

Online Theses and Dissertations

Cybercrime currently poses a significant threat to the infrastructure of the United States. It can exploit vulnerabilities within the Critical Infrastructure or (CI) systems that are increasingly interconnected. Although the increased interconnectedness allows for easier and more efficient communication it creates vulnerabilities that did not exist ten years ago. A lack of a standardized definition of cybercrime has made it increasingly difficult to create policy that will allow for more efficient interagency cooperation and concrete laws regarding cybercrime. Cybercrime thrives on the anonymity of the Internet with the use of specific browsers, The Onion Router for example, to access information …


Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley May 2015

Reputational Privacy And The Internet: A Matter For Law?, Elizabeth Anne Kirley

PhD Dissertations

Reputation - we all have one. We do not completely comprehend its workings and are mostly unaware of its import until it is gone. When we lose it, our traditional laws of defamation, privacy, and breach of confidence rarely deliver the vindication and respite we seek due, primarily, to legal systems that cobble new media methods of personal injury onto pre-Internet laws. This dissertation conducts an exploratory study of the relevance of law to loss of individual reputation perpetuated on the Internet. It deals with three interrelated concepts: reputation, privacy, and memory. They are related in that the increasing lack …


Moving Beyond Regulatory Mechanisms: A Typology Of Internet Control Regimes, Richard Reid Hunt Mar 2014

Moving Beyond Regulatory Mechanisms: A Typology Of Internet Control Regimes, Richard Reid Hunt

Dissertations and Theses

This paper examines national Internet control from a policy regime perspective. The mechanisms through which governments attempt to control the Internet may be developed and implemented by different institutions and agencies, or fall outside of a formal regulatory structure entirely. As such, the totality of the institutions and practices of national Internet control is better conceptualized not as a regulatory regime, but as a control regime. After a survey of the critical policy and control dimensions, a six-part typology of control regimes is proposed. The purpose of this study and typology is exploratory. With comparative research about Internet control regimes …


A Study On The Safe Harbor Rules For Online File Hosting Service Providers Under Copyright Law In China, Shi Xu Mar 2014

A Study On The Safe Harbor Rules For Online File Hosting Service Providers Under Copyright Law In China, Shi Xu

Maurer Theses and Dissertations

Today both the U.S. and China are plagued with copyright infringement, particularly infringement involving online file sharing via file hosting services. The safe harbor rules in the U.S. Digital Millennium Copyright Act (here after “DMCA”) §512(c) provide a certain amount of protection for contributory infringers, such as file hosting service providers, as long as certain conditions are met. Although China has borrowed extensively from DMCA §512(c) in setting up its own safe harbor rules, their content and standard of review remain unclear, leading to inconsistencies in judgments. In this circumstance, this thesis tries to analysis each element of the safe …


Freedom Of Speech Through The Looking Glass: Reflections On The Governance Of Political Discourse In China, The United States, And The European Union, Emily Alice Chesbrough Apr 2012

Freedom Of Speech Through The Looking Glass: Reflections On The Governance Of Political Discourse In China, The United States, And The European Union, Emily Alice Chesbrough

Scripps Senior Theses

Freedom of speech is a right guaranteed by the US, the EU, and China; however, just because a right is guaranteed does not mean the government cannot manipulate the right to achieve its ends. Freedom of speech is commonly associated with the power of language; citizens speak in order to take control of those governing them, in order to assert their desires. In reality, freedom of speech is far more beneficial for governments, who can use this dissent to better control a population. In order to control the population, though, the governments must first control the dissenting speech, the discourse, …


Service-Oriented Foreign Direct Investment: Legal And Policy Frameworks Protecting Digital Assets In Offshoring Information Technology (It) - Enabled Services, Tilahun Mishago Apr 2012

Service-Oriented Foreign Direct Investment: Legal And Policy Frameworks Protecting Digital Assets In Offshoring Information Technology (It) - Enabled Services, Tilahun Mishago

Theses and Dissertations

This thesis examines challenges caused by global cyberspace, which continues to undermine the ability of regulatory instruments aimed at cyber security and deterring cybercrime so that digital assets including those associated with Foreign Direct Investment (FDI) are protected. Progress in information and communication technology (ICT) has brought about both challenges and opportunities for mankind. While ICT has enabled seamless communication on cyberspace, it has also made every phenomenon, positive or negative on cyberspace possible. The good side of ICT is the endless opportunities provided to harness multiple features and capabilities of associated technologies while its side effect being the enormous …


Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson Mar 2011

Amid The Vipers: Establishing Malware's Position Within The Information Ecosystem, Shawn Louis Everett Robertson

Computer Science and Software Engineering

The paper consists of a detailed examination of malware broken down into three main sections.

  1. Introduction: Malware in the World Today. Begins with a definition of terms, examination of the types of malware, research into historical pieces of malicious code, a detailed analysis of the attackers, why malware is so prevalent, and why it is so hard to defend against. This section finishes with a comparison of reasons to create and not to create malware.
  2. Background: "Good" Pieces of Malware. Examination of what makes malware effective. Analysis of the existing CVSS standard and proposal of the alternative VIPERS classification system. …


Online Gaming: Prohibition Vs. Regulation, Andrew Montgomery Dec 2010

Online Gaming: Prohibition Vs. Regulation, Andrew Montgomery

UNLV Theses, Dissertations, Professional Papers, and Capstones

Since online gaming began in 1995, the industry has been unsettled. Despite online gaming being viewed as illegal by the United States government, revenues generated from players in the U.S. grew consistently and rapidly from 1995 to 2006. U.S. lawmakers believed they clarified the legality issue by passing the Unlawful Internet Gambling Enforcement Act in 2006 (UIGEA); however, this legislation did little to discourage people in the U.S. from engaging in online gambling. U.S. lawmakers have long debated prohibition vs. regulation of the industry. Given the apparent ineffectiveness of online gaming prohibition via UIGEA, lawmakers favoring legalization and regulation of …


Governing Gambling In The United States, Maria E. Garcia Jan 2010

Governing Gambling In The United States, Maria E. Garcia

CMC Senior Theses

The role risk taking has played in American history has helped shape current legislation concerning gambling. This thesis attempts to explain the discrepancies in legislation regarding distinct forms of gambling. While casinos are heavily regulated by state and federal laws, most statutes dealing with lotteries strive to regulate the activities of other parties instead of those of the lottery institutions. Incidentally, lotteries are the only form of gambling completely managed by the government. It can be inferred that the United States government is more concerned with people exploiting gambling than with the actual practice of wagering.

In an effort to …


Reforming Copyright Law In The Digital Age: A Comparative Study Of The Legal Resolutions On P2p Transmission Between Taiwan And The United States, I-Hsien Chiu Apr 2008

Reforming Copyright Law In The Digital Age: A Comparative Study Of The Legal Resolutions On P2p Transmission Between Taiwan And The United States, I-Hsien Chiu

Theses and Dissertations

Adjusting legal system of copyright is vigorously in need in the twenty-first century. The abuse of technology has severely damaged the copyright-related industries not only in Taiwan, but also in the United States. Indeed, the lawsuits filed against modern P2P transmission are fairly unprecedented to courts when facing the tension between copyright holders and technology innovators. Therefore, the technological changes provide an enlightened motivation to develop the analysis on whether the approach that legislators and courts take would harmonize private property rights and public interests. Through the arguments, there are meaningful goals the study attempts to achieve. It is essential …