Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- International Law (2)
- Social and Behavioral Sciences (2)
- Arts and Humanities (1)
- Computer Engineering (1)
- Computer Law (1)
-
- Computer Sciences (1)
- Diplomatic History (1)
- Election Law (1)
- Electrical and Computer Engineering (1)
- Engineering (1)
- Forensic Science and Technology (1)
- History (1)
- History of Science, Technology, and Medicine (1)
- Information Security (1)
- International Trade Law (1)
- International and Area Studies (1)
- Internet Law (1)
- Law and Politics (1)
- Legal Studies (1)
- Military, War, and Peace (1)
- Physical Sciences and Mathematics (1)
- Political Science (1)
- Public Affairs, Public Policy and Public Administration (1)
- Rule of Law (1)
- Science and Technology Law (1)
- Social History (1)
- Transnational Law (1)
- Institution
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Law
The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert
The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert
Penn State Journal of Law & International Affairs
Cyberspace – the global environment of digital communications – surrounds and embodies us entirely, 24 hours a day, 7 days a week. We are always on, always connected: emailing, texting, searching, networking, and sharing are all now as commonplace as eating, breathing, and sleeping. But there is a dark side to cyberspace - hidden contests and malicious threats - that is growing like a disease from the inside-out. This disease has many symptoms, and is being reinforced by a multiplicity of disparate but mutually reinforcing causes. Some of these driving forces are unintended byproducts of the new digital universe into …
"Like" Your President: A Case For Online Voting, Jeremy Garson
"Like" Your President: A Case For Online Voting, Jeremy Garson
University of Michigan Journal of Law Reform Caveat
In the wake of Hurricane Sandy, New Jersey allowed displaced residents to vote in the 2012 elections by email. The option to vote online has been available to military members stationed overseas since 2009. New Jersey’s decision to open online voting to civilians raises the question of why this shift didn’t take place sooner. Assuming New Jersey’s system holds up under post-election scrutiny, why not utilize it to the fullest extent possible? Online voter registration is already permitted by eleven states, including the liberal, infrastructure-rich, population-heavy California and the conservative, sparsely populated Alaska. Extending the registration system to voting itself …
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk
Journal of Digital Forensics, Security and Law
It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.
Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott
Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott
Faculty Articles
The United States does not possess a sufficient cyber security framework. Over eighty-five percent of the critical infrastructure in the United States is controlled by private industry. The greatest concern is an intentional cyber attack against electronic control systems that regulate thousands of interconnected computers, routers, and switches. The centralized computer networks controlling the U.S. infrastructure presents tempting targets.
Generally, there are four types of cyber attacks. First, the most common, is service disruption—which aims to flood the target computer with data packets or connection requests, thereby making it unavailable to the user. The second type is designed to capture …
Cyber Security Without Cyber War, Mary Ellen O'Connell
Cyber Security Without Cyber War, Mary Ellen O'Connell
Journal Articles
Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military—the US military today has the largest concentration of expertise and legal authority with respect to cyberspace. Those in the legal community who support this development are divided as to the appropriate legal rules to guide the military in its oversight of the Internet. Specialists on the international law on the use of force argue that with analogy and interpretation, current international law can be applied in a way that allows great freedom without sending the message that …