Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 11 of 11
Full-Text Articles in Law
Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski
Cyber-Extortion: Duties And Liabilities Related To The Elephant In The Server Room, Adam J. Sulkowski
ExpressO
This is a comprehensive analysis of the legal frameworks related to cyber-extortion – the practice of demanding money in exchange for not carrying out threats to commit harm that would involve a victim's information systems. The author hopes it will catalyze an urgently needed discussion of relevant public policy concerns.
Cyber-extortion has, by all accounts, become a common, professionalized and profit-driven criminal pursuit targeting businesses. 17% of businesses in a recent survey indicated having received a cyber-extortion demand. An additional 13% of respondents were not sure if their business had received such a demand.
Awareness of the risks of cybercrime …
A Complete Property Right Amendment, John H. Ryskamp
A Complete Property Right Amendment, John H. Ryskamp
ExpressO
The trend of the eminent domain reform and "Kelo plus" initiatives is toward a comprehensive Constitutional property right incorporating the elements of level of review, nature of government action, and extent of compensation. This article contains a draft amendment which reflects these concerns.
Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno
Cyberstalking, A New Crime: Evaluating The Effectiveness Of Current State And Federal Laws, Naomi Harlin Goodno
ExpressO
Imagine a distressed woman discovering the following message on the Internet that was falsely attributed to her: “Female International Author, no limits to imagination and fantasies, prefers group macho/sadistic interaction . . . stop by my house at [current address] . . . . Will take calls day or night at [current telephone number] . . . I promise you everything you ever dreamt about. Serious responses only.” This is an example of cyberstalking – which involves the use of the Internet, e-mail, or other means of electronic communication to stalk another individual. Current statistics suggest that tens of thousands …
Technoconsen(T)Sus, Andrea M. Matwyshyn
Technoconsen(T)Sus, Andrea M. Matwyshyn
ExpressO
Law is contributing to an information security paradox. Consumers are regularly “consenting” to the installation of computer code that makes them more vulnerable to harms such as identity theft. In particular, digital rights management technology accompanying digital music has recently left a wake of compromised user machines. Using the case study of security-invasive digital rights management technology, this article argues that a fundamental tension exists among intellectual property law, computer intrusion law and contract law regarding meaningful consumer consent in digital contexts. This article proposes to ease the noise in consent doctrine through creating an objective “reasonable digital consumer” standard …
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
Bond Repudiation, Tax Codes, The Appropriations Process And Restitution Post-Eminent Domain Reform, John H. Ryskamp
ExpressO
This brief comment suggests where the anti-eminent domain movement might be heading next.
The “Csi Effect”: Better Jurors Through Television And Science?, Michael D. Mann
The “Csi Effect”: Better Jurors Through Television And Science?, Michael D. Mann
ExpressO
This Comment discusses how television shows such as CSI and Law & Order create heightened juror expectations. This will be published in the Buffalo Public Interest Law Journal's 2005-2006 issue.
The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh
The Z-Test For Percentages: A Statistical Tool To Detect Pretextually Neutral Juror Challenges, Marvin L. Longabaugh
ExpressO
In the article, I discuss the potential use of public opinion polls to measure the discriminatory effect of certain questions in jury selection. While the laws surrounding race and gender based jury selection are known to most lawyers, there has been little scrutiny on questions that might be posed to potential jurors that are facially neutral, yet have a discriminatory impact. This article examines a number of such questions and offers a statistical test to determine whether a proposed question has, in fact, a 98% certainty of having a discriminatory effect if relied upon in jury selection.
Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton
Criminalizing Internet Gambling: Should The Federal Government Keep Bluffing Or Fold?, Wesley S. Ashton
ExpressO
This paper first describes the various mechanical aspects of Internet gambling, and then reviews the U.S. criminal laws that apply to gambling conducted online. As part of this review, several criminal and civil cases involving Internet gambling activities are discussed. Lastly, how the rapidly changing gambling landscape in the United States and the world may effect future federal lawmaking efforts for controlling Internet gambling is considered.
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
The Misery Of Mitra: Considering Criminal Punishment For Computer Crimes, James T. Tsai
ExpressO
This paper analyzes the policies and philosophy of punishment for computer crimes under the post-Sept. 11th regime. I argue that the judicial discourse represented in Mitra represents a willingness to use the Computer Fraud and Abuse Act to go after defendants that cause trouble with critical infrastructures, the so-called “domestic terrorist.” This is manifested in the levels of punishments for such offenses and calls into question whether the traditional theories of punishment are applicable. I argue that as a policy, it makes good sense but the hazy definitions of terrorism may present problems for its success, and instead an approach …
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah
ExpressO
This is a discussion of the legal and economic ramifications of password theft.
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
Breaking The Bank: Revisiting Central Bank Of Denver After Enron And Sarbanes-Oxley, Celia Taylor
ExpressO
No abstract provided.