Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim Oct 2023

Integrating Nist And Iso Cybersecurity Audit And Risk Assessment Frameworks Into Cameroonian Law, Bernard Ngalim

Journal of Cybersecurity Education, Research and Practice

This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity resilience. Cameroon's cybersecurity legal framework provides for audits but does not explicitly enumerate controls. Consequently, integrating relevant controls from the NIST frameworks and ISO Standards can improve the cybersecurity posture in Cameroon while waiting for a comprehensive revision of the legal framework. NIST and ISO are internationally recognized as best practices in information …


Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd Oct 2023

Adoption Of Cybersecurity Policies By Local Governments 2020, Donald F. Norris Phd, Laura K. Mateczun Jd

Journal of Cybersecurity Education, Research and Practice

This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are “general purpose” units (i.e., municipalities, counties, towns and townships). On average, these governments do not practice cybersecurity effectively (Norris, et al., 2019 and 2020). One possible reason is that they do not adopt and/or implement highly recommended cybersecurity policies. In this paper, we examine local government adoption or lack of adoption of cybersecurity policies using data from three surveys. …


Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee Oct 2023

Privacy Harm And Non-Compliance From A Legal Perspective, Suvineetha Herath, Haywood Gelman, Lisa Mckee

Journal of Cybersecurity Education, Research and Practice

In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is a multifaceted concept covering many areas, including the right to access, erasure, and rectify personal data. This paper explores the legal aspects of privacy harm and how they transform into legal action. Privacy harm is the negative impact to an individual as a result of the unauthorized release, gathering, …


Death By Police: When “Protecting And Serving” Goes Wrong, Hesper Mallis Aug 2021

Death By Police: When “Protecting And Serving” Goes Wrong, Hesper Mallis

Symposium of Student Scholars

The recent cases of law enforcement using lethal force in the United States have gained massive public attention. My dataset is from the Mapping Police Violence website. The website’s focus was to create a heat map to display where police killings occurred most frequently. The website has a dataset with information on 7,664 deaths of suspects. The variables in the dataset include age, sex and race of the suspect; geographic location; alleged threat level; alleged weapon; cause of death; and criminal charges against the officer. In addition, the variables include whether the individual had a mental illness, was armed or …


Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully Aug 2021

Marijuana Arrests In Toronto Canada: A Look Into The Canadian Criminal Justice System, Steven Tully

Symposium of Student Scholars

Marijuana related drug offenses made up fifty-eight percent of all Controlled Drugs and Substances Act offenses in Canada in 2016. On October 17, 2018, Canada legalized marijuana. As part of the efforts to legalize marijuana, descriptive statistics of single variables, like the age of the arrestees and the number of people arrested per year, were reported by the Toronto Star newspaper. The dataset analyzed in this research predates the legalization of marijuana and was collected from 1997 to 2002 on 5,226 individuals arrested in Toronto, Canada for simple possession of small quantities of marijuana. When an offender was arrested for …


Bias In Police Shootings: Is It Just An Opinion?, Phuong Ho Aug 2021

Bias In Police Shootings: Is It Just An Opinion?, Phuong Ho

Symposium of Student Scholars

The claims of racism have drawn public attention toward police brutality and its impact on minorities. Is this just an opinion or is there any statistical evidence? Recent studies from The Atlantic have investigated the average age and ethnicity of victims from police killings in 2015-2016. As an Asian-American, I am motivated to examine the issue of police killings among races and other demographics to find any bias that is present. Using the dataset of 2,204 victims of police killings (2015-2016) collected by The Guardian, I will examine the following variables for bias: age, cause of death, armed/unarmed, race/ethnicity, and …


The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor Oct 2016

The Role Of State Privacy Regulations In Mitigating Internet Users’ Privacy Concerns: A Multilevel Perspective, Tawfiq Alashoor

KSU Proceedings on Cybersecurity Education, Research and Practice

In the U.S., there is no comprehensive national law regulating the collection and use of personal information. As a response to the high level of privacy concerns among U.S. citizens and the currently limited regulations, states have enacted their own privacy laws over and above the principles of Fair Information Practices (FIP). In this exploratory study, we draw upon the privacy literature and the Restricted Access/Limited Control (RALC) theory of privacy to study the privacy concerns phenomenon with a multilevel theoretical lens. We introduce and test three novel propositions pertaining to the impact of state level privacy regulations on privacy …


Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne Oct 2016

Health It Security: An Examination Of Modern Challenges In Maintaining Hipaa And Hitech Compliance, Andrew S. Miller, Bryson R. Payne

KSU Proceedings on Cybersecurity Education, Research and Practice

This work describes an undergraduate honors research project into some of the challenges modern healthcare providers face in maintaining compliance with the Health Insurance Portability and Accountability Act (HIPAA) and HITECH (Health Information Technology for Economic and Clinical Health) Act. An overview of the pertinent sections of both the HIPAA and HITECH Acts regarding health information security is provided, along with a discussion of traditionally weak points in information security, including: people susceptible to social engineering, software that is not or cannot be regularly updated, and targeted attacks (including advanced persistent threats, or APTs). Further, the paper examines potential violations …