Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (6)
- Insurance Law (3)
- Intellectual Property Law (2)
- Law and Society (2)
- National Security Law (2)
-
- Privacy Law (2)
- Commercial Law (1)
- Communications Law (1)
- Computer Law (1)
- Computer Sciences (1)
- Contracts (1)
- Criminal Law (1)
- Evidence (1)
- Information Security (1)
- International Relations (1)
- Jurisprudence (1)
- Legal Profession (1)
- Legislation (1)
- Physical Sciences and Mathematics (1)
- Political Science (1)
- Science and Technology Law (1)
- Science and Technology Studies (1)
- Sexuality and the Law (1)
- Social and Behavioral Sciences (1)
- State and Local Government Law (1)
- Torts (1)
- Institution
- Publication
- Publication Type
Articles 1 - 8 of 8
Full-Text Articles in Law
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Revenge Porn, Thomas Lonardo, Tricia P. Martland, Rhode Island Bar Journal
Life of the Law School (1993- )
No abstract provided.
An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh
An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh
Electronic Theses and Dissertations
Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:
-
Discussion and Dialogue
-
Research
-
Confidence Building Measures
-
Incident Response
-
Crime …
Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan
Pirate Tales From The Deep [Web]: An Exploration Of Online Copyright Infringement In The Digital Age, Nicholas C. Butland, Justin J. Sullivan
University of Massachusetts Law Review
Technology has seen a boom over the last few decades, making innovative leaps that border on science fiction. With the most recent technological leap came a new frontier of intellectual property and birthed a new class of criminal: the cyber-pirate. This Article discusses cyber-piracy and its interactions and implications for modern United States copyright law. The Article explains how copyright law, unprepared for the boom, struggled to adapt as courts reconciled the widely physical perceptions of copyright with the digital information being transferred between billions of users instantaneously. The Article also explores how cyber-piracy has made, and continues to make, …
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Journal Articles
Cyber risks are the newest risks of the 21st century. The breadth and cost of cyber attacks are astonishing. Worldwide damages caused by cyber attack are predicted to reach $6 trillion by 2021. Between 2015 and 2017, ransomware damages alone increased from $325 million to approximately $5 billion. In 2017, WannaCry ransomware shut down over 300,000 computer systems across 150 countries.
On April 13, 2018, the Penn State Law Review held a symposium to discuss the evolution of cyber risks and cyber insurance. The symposium was comprised of an eclectic group of legal practitioners and scholars who presented four articles. …
The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch
The Industrial Internet Of Things: Risks, Liabilities, And Emerging Legal Issues, Mauricio Paez, Kerianne Tobitsch
NYLS Law Review
No abstract provided.
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Concluding Observations On Sovereignty In Cyberspace, Gary Corn, Robert Taylor
Articles in Law Reviews & Other Academic Journals
In Sorerejgntyin Cyberspace: Lex Lata Vel Non?, Michael Schmitt and Liis Vihul argue that territorial sovereignty is a primary rule of international law that limits cyber activities. They recognize, however, that not all cyber effects constitute violations of territorial sovereignty, and like Rule 4 in the Tallinn Manual 2.0 and its commentary, they acknowledge a distinct lack of consensus among the Tallinn participants on the critical question of applicable thresholds. Problematically, they do not identify the necessary state practice and opinio juris that would be required to establish either the primary rule that they proffer or the existence and contours …
The Techno-Neutrality Solution To Navigating Insurance Coverage For Cyber Losses, Jeffrey W. Stempel, Erik S. Knutsen
The Techno-Neutrality Solution To Navigating Insurance Coverage For Cyber Losses, Jeffrey W. Stempel, Erik S. Knutsen
Scholarly Works
Insurers currently constrict coverage for losses involving electronic information in traditional insurance product lines. As a result, insurance customers are driven to the brave new world of non-standardized varieties of cyber-risk insurance policies. That world abounds with coverage gaps as the market for cyber insurance sorts itself out. Until that synchronization of coverage for cyber losses occurs, litigation is bound to occur as the boundaries of coverage remain patchwork and uncertain.
This article examines the degree to which cyber losses differ from other insured losses. The cyber-loss insurance coverage jurisprudence reveals a mishmash of principles and coverage terms that are …
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Insuring Against Cyber Risk: The Evolution Of An Industry (Introduction), Christopher French
Christopher C. French