Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (3)
- Business (2)
- Social and Behavioral Sciences (2)
- Commercial Law (1)
- Computer Law (1)
-
- Computer Sciences (1)
- Contracts (1)
- Criminology (1)
- Engineering (1)
- First Amendment (1)
- Insurance Law (1)
- Law and Gender (1)
- Law and Society (1)
- National Security Law (1)
- Other Engineering (1)
- Physical Sciences and Mathematics (1)
- Privacy Law (1)
- Public Affairs, Public Policy and Public Administration (1)
- Public Policy (1)
- Science and Technology Studies (1)
- Sexuality and the Law (1)
- Social Policy (1)
- Sociology (1)
- Technology and Innovation (1)
- Torts (1)
Articles 1 - 5 of 5
Full-Text Articles in Law
Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny
Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny
JoAnne Sweeny
No abstract provided.
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Christopher C. French
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg
Jan Kallberg
Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
What Is Really Fair: Internet Sales And The Georgia Long-Arm Statute, Ryan T. Holte
What Is Really Fair: Internet Sales And The Georgia Long-Arm Statute, Ryan T. Holte
Prof. Ryan T. Holte
This article analyzes the current issue of online merchants being forced to defend themselves in foreign jurisdictions during litigation concerning online sales. Part I describes the history of personal jurisdiction from its nineteenth century concerns with territoriality to the twentieth century minimum contacts standard to other, more recent developments. Part II summarizes personal jurisdiction and minimum contacts as applied to the Internet generally and discusses whether Internet sales contain sufficient minimum contacts to satisfy the constitutional prerequisites for the exercise of personal jurisdiction over the seller. Part III analyzes the Georgia long-arm statute as it relates to jurisdiction over persons …