Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Law

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips Oct 2018

The Robot-Transporter: Sex Trafficking, Autonomous Vehicles, And Criminal Liability For Manufacturers, Olivia Phillips

Dickinson Law Review (2017-Present)

Despite global condemnation, sex trafficking continues to plague our world. Even in developed countries, the problem persists. Technological advancements, like the Internet, have spurred the development of organized sex trafficking networks and have made “transactions” easier. Although law enforcement agencies have tried to adapt their investigative techniques to combat the problem, developments in technology move at a much quicker rate.

Autonomous vehicles (AVs) will present a new set of challenges for law enforcement agencies in the fight against sex trafficking. In the not-too-distant future, AVs, or “self-driving cars,” will dominate the roadways. An AV will be completely aware of the …


Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang Jun 2017

Cybercrime Deterrence And International Legislation: Evidence From Distributed Denial Of Service Attacks, Kai-Lung Hui, Seung Hyun Kim, Qiu-Hong Wang

Research Collection School Of Computing and Information Systems

In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by economic …


Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman Jan 2017

Cyber Strategy & Policy: International Law Dimensions, Matthew C. Waxman

Faculty Scholarship

Important international law questions for formulating cyber strategy and policy include whether and when a cyber-attack amounts to an “act of war,” or, more precisely, an “armed attack” triggering a right of self-defense, and how the international legal principle of “sovereignty” could apply to cyber activities. International law in this area is not settled. There is, however, ample room within existing international law to support a strong cyber strategy, including a powerful deterrent. The answers to many international law questions discussed below depend on specific, case-by-case facts, and are likely to be highly contested for a long time to come. …


Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw Jan 2013

Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw

Articles

Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.

At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …


Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah Oct 2006

Password Theft: Rethinking An Old Crime In A New Era, Daniel S. Shamah

Michigan Telecommunications & Technology Law Review

By putting themselves out in front as the victims, the Recording Industry Association of America (RIAA) helped reshape the governing norms of the times, and as a result, people viewed the act of file-sharing differently. By forcing people to see music downloading as a form of theft, the RIAA was quite successful in deterring it. In the process, they also proposed a radical view of theft that changes our basic economic understandings of the action[...] This paper argues that the RIAA's model for deterring music theft could be successfully used to deter many other forms of computer theft, and, specifically, …