Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Law

Verification Methods In Cyber Attack Treaties, Grant Hodgson Feb 2016

Verification Methods In Cyber Attack Treaties, Grant Hodgson

Grant Hodgson

The fundamental differences between cyber weapons and traditional military weapons present challenges to verification techniques used in the past. This paper will discuss the challenges in constructing, implementing, and verifying a cyberattack treaty. Part I, will discuss the nature of cyberattacks and what makes them difficult for verification purposes. Part II will describe techniques that have previously been used to verify other treaties. Each technique is evaluated for its potential efficacy when applied to cyberattacks.


Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford Aug 2015

Unpacking The International Law On Cybersecurity Due Diligence: Lessons From The Public And Private Sectors, Scott J. Shackelford

Scott Shackelford

Although there has been a relative abundance of work done on exploring the contours of the law of cyber war, far less attention has been paid to defining a law of cyber peace applicable below the armed attack threshold. Among the most important unanswered questions is what exactly nations’ due diligence obligations are to one another and to their respective private sectors. The International Court of Justice (“ICJ”) has not yet explicitly considered this topic, though it has ruled in the Corfu Channel case that one country’s territory should not be “used for acts that unlawfully harm other States.” But …


Developing An International Carbon Tax Regime, Steven Specht Aug 2015

Developing An International Carbon Tax Regime, Steven Specht

Steven Specht

As atmospheric CO2 remains in the range of 400 ppm, it is necessary to find new international coordination to deal with climate change. The best way forward is an international regime of harmonized domestic carbon taxes. By agreeing to a minimum amount of taxation on domestic, point-source producers, money can be set aside for adaptation costs and alternative means of energy production. Finally, such a plan will overcome the problem of non-participation of countries in agreements like the Kyoto Protocol. As this is a treaty dealing with economics and trade, countries can place taxes on imports of non-participatory countries under …


Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco Aug 2015

Finding The Adequate Legal Framework For The Deployment Of Ocean Renewable Energy Through Area-Based Management, Xiao Recio-Blanco

Xiao Recio-Blanco

The world runs on electricity, but its global distribution is uneven and incomplete. The lack of access to electricity denies some people the most basic benefits, from healthcare and sanitation to security and economic development.

To increase access to electricity, most developing nations have relied on traditional sources of energy, namely fossil fuels, and the extension of a central electrical grid. Scholars and specialized International Organizations suggest that the implementation of renewable energy technologies through small-to-mid scale grid projects could be a reliable alternative. However, renewable energy technologies must overcome three formidable hurdles: low reliability, uneven availability, and the high …


Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi May 2015

Cybercrime: A Saudi And American Perspective, Hussam M. Alkanbashi

Hussam M. Alkanbashi

Cybercrime is one of the greatest threats facing the International community. Defined as criminal activity perpetrated using computers and the internet, cybercrime has developed into a trillion dollar a year industry, affecting millions of people around the world, as well as countless businesses and the governments of every nation. With nearly 431 million victims projected in 2015, cyber related crime is one of if not the most frequent, costly and pervasive crimes worldwide. This article examines and assesses the effectiveness of Saudi and American Cyber Laws in deterring the growing global threats posed by cybercrime. The article studies cyber identity …


Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno Feb 2015

Promoting “Academic Entrepreurship” In Europe And The United States: Creating An Intellectual Property Regime To Facilitate The Efficient Transfer Of Knowledge From The Lab To The Patient, Constance Bagley, Christina Tvarno

Constance E. Bagley

In 2014, the European Commission announced the launch of a study of knowledge transfer by public research organizations and other institutes of higher learning “to determine which additional measures might be needed to ensure an optimal flow of knowledge between the public research organisations and business thereby contributing to the development of the knowledge based economy.” As the European Commission has recognized, the EU needs to take action to “unlock the potential of IPRs [intellectual property rights] that lie dormant in universities, research institutes and companies.” This article builds on our earlier work on structuring efficient pharmaceutical public-private partnerships (PPPPs) …


Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic Jan 2015

Toward A State-Centric Cyber Peace? Analyzing The Role Of National Cybersecurity Strategies In Enhancing Global Cybersecurity, Scott J. Shackelford, Andraz Kastelic

Scott Shackelford

There is a growing consensus that nations bear increasing responsibility for enhancing cybersecurity. A related recent trend has been the adoption of long-term strategic plans to help deter, protect, and defend against cyber threats. These national cybersecurity strategies outline a nation’s core values and goals in the realm of cybersecurity law and policy, from mitigating cybercrime and espionage to preparing for cyber warfare. This Article assesses the notion that nations bear the primary responsibility for managing cyber attacks and mitigating cybercrime by analyzing thirty-four national cybersecurity strategies as a vehicle to discover governance trends that could give rise to customary …


Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding Apr 2014

Preventing Cold War: Militarization In The Southernmost Continent And The Antarctic Treaty System's Fading Effectiveness, Dillon A. Redding

Dillon A Redding

This note argues that the preservation of Antarctica for peaceful research and internationally cooperative activity as envisioned originally by the Antarctic Treaty in 1961 has gone unrealized amid growing international interest in the strategic advantages offered by Antarctica, including the possibility of large swathes of mineral deposits and optimal locations for satellite stations. Part 1 describes the motivations behind the Antarctic Treaty System (ATS) and outlines the relevant provisions of the Antarctic Treaty. Part 2 examines the military advantages to a state presence in Antarctica and the ways in which the ATS allows for such a presence to be carried …


The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson Jan 2014

The Evolution Of The Digital Millennium Copyright Act; Changing Interpretations Of The Dmca And Future Implications For Copyright Holders, Hillary A. Henderson

Hillary A Henderson

Copyright law rewards an artificial monopoly to individual authors for their creations. This reward is based on the belief that, by granting authors the exclusive right to reproduce their works, they receive an incentive and means to create, which in turn advances the welfare of the general public by “promoting the progress of science and useful arts.” Copyright protection subsists . . . in original works of authorship fixed in any tangible medium of expression, now known or later developed, from which they can be perceived, reproduced, or otherwise communicated, either directly or with the aid of a machine or …


An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock Jan 2014

An Empirical Study: A Socio-Legal Approach To Gauging Attitudes To Intellectual Property Rights, Faris K. Nesheiwat, Mike Adcock

Ferris K Nesheiwat

This article seeks to provide a socio-legal framework for the examination of the attitude of a section of the Jordanian public towards intellectual property rights (IPRs), using copyright protected software as an example; it provides an overview of perceptions of IPRs within an Arabic and predominantly Muslim society, and examines how such perceptions impact attitudes towards abiding with, and enforcement of, IPRs. Through its analytical value and empirical research, this paper fills a void in the availability of reliable empirical data in Jordan as part of the analysis to gauge the impact of intellectual property (IP) laws. A review of …


Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison Jun 2013

Science And Compliance In The Arctic: A Constructivist Approach To The Un Commission On The Limits Of The Continental Shelf, Sari M. Graben, Peter Harrison

Sari M Graben

The United Nations Commission on the Limits of the Continental Shelf is expected to play an essential role in delineating the rights of the Arctic states to sea bed resources in the Arctic Ocean. Positivist theories of international law generally source Arctic state compliance to the binding effect of Article 76 of the UN Convention on the Law of the Sea. However, positivist explanations fail to answer why the Arctic states, which are authorized to establish their own limits, would accept the sovereignty costs associated with the Commission’s legal and scientific interpretations. In order to better understand how the Commission …


The Extraterritoriality Of Eu Data Privacy Law - Its Theoretical Justification And Its Practical Effect On U.S. Businesses, Dan Jerker B. Svantesson Apr 2013

The Extraterritoriality Of Eu Data Privacy Law - Its Theoretical Justification And Its Practical Effect On U.S. Businesses, Dan Jerker B. Svantesson

Dan Svantesson

Due to its extraterritorial effect, the European Union’s trailblazing data privacy law has long been a major concern for U.S. businesses. With the proposal for a new data privacy framework in the EU, with potential penalties of up to 2% of an offending enterprise’s annual worldwide turnover, such concerns are justified indeed; particularly as the EU at the same time seems to be expanding the extraterritorial reach of its data privacy law.

This article examines the extraterritoriality of current and proposed EU data privacy law and analyses whether those claims of extraterritoriality can be either justified or objected to by …


Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman Jan 2012

Threats Escalate: Corporate Information Technology Governance Under Fire, Lawrence J. Trautman

Lawrence J. Trautman Sr.

In a previous publication The Board’s Responsibility for Information Technology Governance, (with Kara Altenbaumer-Price) we examined: The IT Governance Institute’s Executive Summary and Framework for Control Objectives for Information and Related Technology 4.1 (COBIT®); reviewed the Weill and Ross Corporate and Key Asset Governance Framework; and observed “that in a survey of audit executives and board members, 58 percent believed that their corporate employees had little to no understanding of how to assess risk.” We further described the new SEC rules on risk management; Congressional action on cyber security; legal basis for director’s duties and responsibilities relative to IT governance; …


Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq. Nov 2011

Cloud Computing Providers And Data Security Law: Building Trust With United States Companies, Jared A. Harshbarger Esq.

Jared A. Harshbarger

Cloud computing and software-as-a-service (SaaS) models are revolutionizing the information technology industry. As these services become more prevalent, data security and privacy concerns will also rise among consumers and the companies who consider using them. Cloud computing providers must establish a sufficient level of trust with their potential customers in order to ease initial fears - and ensure certain compliance obligations will be met - at least to the extent that any such inquiring customer will feel comfortable enough to ultimately take the irreversible step of releasing their sensitive data and personal information into the cloud.


Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana May 2009

Fulfilling Technology's Promise: Enforcing The Rights Of Women Caught In The Global High-Tech Underclass, Shruti Rana

Shruti Rana

In the early 1980s, Malaysian women working in electronics factories began to experience hallucinations and seizures. Factory bosses manipulated their employees' religious and cultural beliefs, convincing the women that their bodies were inhabited by demons. In this manner, they avoided confronting the more likely causes: the rigid, paternalistic work environment, the intense production pressures placed on the women, and the lengthy shifts and potentially hazardous conditions that the women were forced to endure. This example illustrates the use of gender, religion, and to control and exploit women's labor in the high-tech industry. Unfortunately, this is not an isolated situation. This …