Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (4)
- Data protection (4)
- Privacy (4)
- Data privacy (2)
- Technology (2)
-
- AALL Publications (1)
- AALL Spectrum (1)
- Body of Knowledge (1)
- Campaign finance violation (1)
- Chilling effects (1)
- Complex Adaptive Systems (1)
- Compliance (1)
- Consent (1)
- Convention on cybercrime (1)
- Corruption (1)
- Cross-jurisdictional privacy management (1)
- Cybercrime (1)
- Data Aggregation (1)
- Data access (1)
- Data breach (1)
- Data management (1)
- Data protection law (1)
- Data protection reform (1)
- Data security (1)
- Deterrence (1)
- Distributed denial of service attack (1)
- Evidence-based regulation (1)
- Framework (1)
- Fraudulent legal claim (1)
- GDPR (1)
Articles 1 - 13 of 13
Full-Text Articles in Law
Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip
Personal Data Protection Act 2012: Understanding The Consent Obligation, Man Yip
Research Collection Yong Pung How School Of Law
The Personal Data Protection Act 20121 (“PDPA”) provides the baseline standards of protection of personal data and works in tandem with existing law to provide comprehensive protection. The birth of the legislation clearly signals Singapore’s commitment to protect the collection, use and disclosure of personal data in the age of big data and its awareness of the importance of such protection in strengthening Singapore’s position as a leading commercial hub. Significantly, the PDPA protection model balances “both the rights of individuals to protect their personal data” against “the needs of organisations to collect, use or disclose personal data for legitimate …
Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang
Research Collection School Of Computing and Information Systems
In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by economic …
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
Ispy: Threats To Individual And Institutional Privacy In The Digital World, Lori Andrews
All Faculty Scholarship
What type of information is collected, who is viewing it, and what law librarians can do to protect their patrons and institutions.
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
Harnessing Legal Complexity, Daniel Katz, J. Ruhl, M Bommarito
All Faculty Scholarship
No abstract provided.
Research@Smu: Connecting The Dots, Singapore Management University
Research@Smu: Connecting The Dots, Singapore Management University
Research@SMU: Connecting the Dots
The word “Management” in the name of our university was carefully and deliberately chosen to address the needs of institutions and decisionmakers across all segments of society: business enterprises and the private sector, government and the public sector, and civil society and the people sector. Unless you are already familiar with the breadth and depth of research output from Singapore Management University (SMU), you would naturally assume that we were a “management” university that was focusing exclusively on business – in essence, a large business school. The reality is quite different.
Through this book, you will gain a more complete …
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Data Protection And Humanitarian Emergencies, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Regulating Religious Robots: Free Exercise And Rfra In The Time Of Superintelligent Artificial Intelligence, Ignatius Michael D. Ingles
Regulating Religious Robots: Free Exercise And Rfra In The Time Of Superintelligent Artificial Intelligence, Ignatius Michael D. Ingles
Ateneo School of Law Publications
No abstract provided.
Cybersecurity Stovepiping, David Thaw
Cybersecurity Stovepiping, David Thaw
Articles
Most readers of this Article probably have encountered – and been frustrated by – password complexity requirements. Such requirements have become a mainstream part of contemporary culture: "the more complex your password is, the more secure you are, right?" So the cybersecurity experts tell us… and policymakers have accepted this "expertise" and even adopted such requirements into law and regulation.
This Article asks two questions. First, do complex passwords actually achieve the goals many experts claim? Does using the password "Tr0ub4dor&3" or the passphrase "correcthorsebatterystaple" actually protect your account? Second, if not, then why did such requirements become so widespread? …
The Gdpr As A Chance To Break Down Borders, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Nora Ni Loideain
The Gdpr As A Chance To Break Down Borders, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Nora Ni Loideain
Articles by Maurer Faculty
No abstract provided.
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Ancient Worries And Modern Fears: Different Roots And Common Effects Of U.S. And Eu Privacy Regulation, David Thaw, Pierluigi Perri
Articles
Much legal and technical scholarship discusses the differing views of the United States and European Union toward privacy concepts and regulation. A substantial amount of effort in recent years, in both research and policy, focuses on attempting to reconcile these viewpoints searching for a common framework with a common level of protection for citizens from both sides of Atlantic. Reconciliation, we argue, misunderstands the nature of the challenge facing effective cross-border data flows. No such reconciliation can occur without abdication of some sovereign authority of nations, that would require the adoption of an international agreement with typical tools of international …
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
The Rise Of Cybersecurity And Its Impact On Data Protection, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Machine Learning With Personal Data: Is Data Protection Law Smart Enough To Meet The Challenge?, Fred H. Cate, Christopher Kuner, Dan Jerker B. Svantesson, Orla Lynskey, Christopher Millard
Articles by Maurer Faculty
No abstract provided.
Taking A Byte Out Of Corruption: A Data Analytic Framework For Cities To Fight Fraud, Cut Costs, And Promote Integrity, Center For The Advancement Of Public Integrity
Taking A Byte Out Of Corruption: A Data Analytic Framework For Cities To Fight Fraud, Cut Costs, And Promote Integrity, Center For The Advancement Of Public Integrity
Center for the Advancement of Public Integrity (Inactive)
In recent years, the emerging science of data analytics has equipped law enforcement agencies and urban policymakers with game-changing tools. Many leaders and thinkers in the public integrity community believe such innovations could prove equally transformational for the fight against public corruption. However, corruption control presents unique challenges that must be addressed before city watchdog agencies can harness the power of big data. City governments need to improve data collection and management practices and develop new models to leverage available data to better monitor corruption risks.
To bridge this gap and pave the way for a potential data breakthrough in …