Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny Apr 2019

Trapped In Public: The Regulation Of Street Harassment And Cyber-Harassment Under The Captive Audience Doctrine, Joanne Sweeny

JoAnne Sweeny

No abstract provided.


Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French Dec 2017

Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French

Christopher C. French

Cyber risks are the newest risks of the 21st century. The breadth and cost of cyber attacks are astonishing. Worldwide damages caused by cyber attack are predicted to reach $6 trillion by 2021. Between 2015 and 2017, ransomware damages alone increased from $325 million to approximately $5 billion. In 2017, WannaCry ransomware shut down over 300,000 computer systems across 150 countries.

On April 13, 2018, the Penn State Law Review held a symposium to discuss the evolution of cyber risks and cyber insurance. The symposium was comprised of an eclectic group of legal practitioners and scholars who presented four articles. …


Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg Jun 2015

Bringing Fear To The Perpetrators – Humanitarian Cyber Operations As Evidence Gathering And Deterrence, Jan Kallberg

Jan Kallberg

Humanitarian cyber operations would allow democratic states to utilise cyber operations as a humanitarian intervention to capture information and create a foundation for decision making for collective international action supported by humanitarian international law. This follows the legal doctrine of responsibility to protect, which relies first on the nation state itself but when the state fails to protect its citizens, then the international community can act ignoring the repressive or failed states national sovereignty. Another support for humanitarian cyber operations is the ability to capture evidence to support future prosecution for crimes against humanity. The weakest link in the chain …


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


What Is Really Fair: Internet Sales And The Georgia Long-Arm Statute, Ryan T. Holte May 2009

What Is Really Fair: Internet Sales And The Georgia Long-Arm Statute, Ryan T. Holte

Prof. Ryan T. Holte

This article analyzes the current issue of online merchants being forced to defend themselves in foreign jurisdictions during litigation concerning online sales. Part I describes the history of personal jurisdiction from its nineteenth century concerns with territoriality to the twentieth century minimum contacts standard to other, more recent developments. Part II summarizes personal jurisdiction and minimum contacts as applied to the Internet generally and discusses whether Internet sales contain sufficient minimum contacts to satisfy the constitutional prerequisites for the exercise of personal jurisdiction over the seller. Part III analyzes the Georgia long-arm statute as it relates to jurisdiction over persons …