Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson Jan 2005

Cybersecurity, Identity Theft, And The Limits Of Tort Liability, Vincent R. Johnson

Faculty Articles

Tort law is the best vehicle for allocating the risks and spreading the costs of database intrusion. It can incentivize database possessors (“possessors”) and data subjects to minimize the harm associated with breaches of database security while also balancing each party’s interests. Life is built upon computerized databases and the information of those databases is subject to hackers and other cyber-threats, which can cause catastrophic damage. It is hard to identify hackers; however, a better object for recovery is likely the possessors who fail to prevent or reveal a security breach.

The law governing database possessors’ liability is far from …


Deterrence And Origin Of Legal System: Evidence From 1950-1999, Michael L. Smith Jan 2005

Deterrence And Origin Of Legal System: Evidence From 1950-1999, Michael L. Smith

Faculty Articles

This article offers evidence on legal systems' deterrence of acts that may cause harm, which extends law—and finance—literature comparing common law and civil code systems. Fatality rates from two causes are used to gauge deterrence: (1) motor vehicle accidents and (2) accidents other than motor vehicle. Both vary significantly across countries classified by origin of legal system. The data cover 50 years, offering evidence on evolution of differences over time. Findings for accidents other than motor vehicle are evidence on legal system flexibility, as the diffuse set of causes increases the difficulty of specifying harmful actions ex ante.