Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Criminal Law (6)
- Computer Engineering (2)
- Computer Sciences (2)
- Databases and Information Systems (2)
- Engineering (2)
-
- Intellectual Property Law (2)
- Internet Law (2)
- Physical Sciences and Mathematics (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Law (2)
- Science and Technology Policy (2)
- Social and Behavioral Sciences (2)
- American Politics (1)
- Arts and Humanities (1)
- Business (1)
- Computer Law (1)
- Curriculum and Instruction (1)
- Data Storage Systems (1)
- Education (1)
- Emergency and Disaster Management (1)
- Ethics and Political Philosophy (1)
- Fourth Amendment (1)
- Higher Education (1)
- Information Security (1)
- Infrastructure (1)
- Jurisdiction (1)
- Military and Veterans Studies (1)
- Other Political Science (1)
- Philosophy (1)
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Law
Cybersecurity-The Internet Of Things, Amy J. Ramson
Cybersecurity-The Internet Of Things, Amy J. Ramson
Open Educational Resources
With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-Corporate Espionage, Amy J. Ramson
Cybersecurity-Corporate Espionage, Amy J. Ramson
Open Educational Resources
The goals of this team activity in the area of criminal law, cybersecurity and cyber crime are to facilitate team work, critical thinking and presentation skills. Students will be grouped into two teams. As a team, they will analyze cases about corporate espionage committed by nation states and industry competitors through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-Fake News, Amy J. Ramson
Cybersecurity-Fake News, Amy J. Ramson
Open Educational Resources
This goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.
Cybersecurity-The Silk Road Market, Amy J. Ramson
Cybersecurity-The Silk Road Market, Amy J. Ramson
Open Educational Resources
This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.
Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson
Cybersecurity-Cybercrime-The Legal Environment, Amy J. Ramson
Open Educational Resources
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. sate jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist
Cybersecurity-Beyond Data Protection, Amy J. Ramson, Ez Tech Assist
Open Educational Resources
No abstract provided.
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Breadcrumbs: Privacy As A Privilege, Prachi Bhardwaj
Capstones
Breadcrumbs: Privacy as a Privilege Abstract
By: Prachi Bhardwaj
In 2017, the world saw more data breaches than in any year prior. The count was more than the all-time high record in 2016, which was 40 percent more than the year before that.
That’s because consumer data is incredibly valuable today. In the last three decades, data storage has gone from being stored physically to being stored almost entirely digitally, which means consumer data is more accessible and applicable to business strategies. As a result, companies are gathering data in ways previously unknown to the average consumer, and hackers are …
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Framing The Question, "Who Governs The Internet?", Robert J. Domanski
Publications and Research
There remains a widespread perception among both the public and elements of academia that the Internet is “ungovernable”. However, this idea, as well as the notion that the Internet has become some type of cyber-libertarian utopia, is wholly inaccurate. Governments may certainly encounter tremendous difficulty in attempting to regulate the Internet, but numerous types of authority have nevertheless become pervasive. So who, then, governs the Internet? This book will contend that the Internet is, in fact, being governed, that it is being governed by specific and identifiable networks of policy actors, and that an argument can be made as to …