Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert Nov 2012

The Growing Dark Side Of Cyberspace ( . . . And What To Do About It), Ronald Deibert

Penn State Journal of Law & International Affairs

Cyberspace – the global environment of digital communications – surrounds and embodies us entirely, 24 hours a day, 7 days a week. We are always on, always connected: emailing, texting, searching, networking, and sharing are all now as commonplace as eating, breathing, and sleeping. But there is a dark side to cyberspace - hidden contests and malicious threats - that is growing like a disease from the inside-out. This disease has many symptoms, and is being reinforced by a multiplicity of disparate but mutually reinforcing causes. Some of these driving forces are unintended byproducts of the new digital universe into …


"Like" Your President: A Case For Online Voting, Jeremy Garson Jan 2012

"Like" Your President: A Case For Online Voting, Jeremy Garson

University of Michigan Journal of Law Reform Caveat

In the wake of Hurricane Sandy, New Jersey allowed displaced residents to vote in the 2012 elections by email. The option to vote online has been available to military members stationed overseas since 2009. New Jersey’s decision to open online voting to civilians raises the question of why this shift didn’t take place sooner. Assuming New Jersey’s system holds up under post-election scrutiny, why not utilize it to the fullest extent possible? Online voter registration is already permitted by eleven states, including the liberal, infrastructure-rich, population-heavy California and the conservative, sparsely populated Alaska. Extending the registration system to voting itself …


An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk Jan 2012

An Australian Perspective On The Challenges For Computer And Network Security For Novice Endusers, Patryk Szewczyk

Journal of Digital Forensics, Security and Law

It is common for end-users to have difficulty in using computer or network security appropriately and thus have often been ridiculed when misinterpreting instructions or procedures. This discussion paper details the outcomes of research undertaken over the past six years on why security is overly complex for endusers. The results indicate that multiple issues may render end-users vulnerable to security threats and that there is no single solution to address these problems. Studies on a small group of senior citizens has shown that educational seminars can be beneficial in ensuring that simple security aspects are understood and used appropriately.


Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott Jan 2012

Cyber Security And The Government/ Private Sector Connection, Jeffrey F. Addicott

Faculty Articles

The United States does not possess a sufficient cyber security framework. Over eighty-five percent of the critical infrastructure in the United States is controlled by private industry. The greatest concern is an intentional cyber attack against electronic control systems that regulate thousands of interconnected computers, routers, and switches. The centralized computer networks controlling the U.S. infrastructure presents tempting targets.

Generally, there are four types of cyber attacks. First, the most common, is service disruption—which aims to flood the target computer with data packets or connection requests, thereby making it unavailable to the user. The second type is designed to capture …


Cyber Security Without Cyber War, Mary Ellen O'Connell Jan 2012

Cyber Security Without Cyber War, Mary Ellen O'Connell

Journal Articles

Which government agency should have primary responsibility for the Internet? The USA seems to have decided this question in favour of the military—the US military today has the largest concentration of expertise and legal authority with respect to cyberspace. Those in the legal community who support this development are divided as to the appropriate legal rules to guide the military in its oversight of the Internet. Specialists on the international law on the use of force argue that with analogy and interpretation, current international law can be applied in a way that allows great freedom without sending the message that …