Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 14 of 14
Full-Text Articles in Law
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Who's Watching The Kids?--The Use Of Peer-To-Peer Programs To Cyberstalk Children, Jessica Herndon
Oklahoma Journal of Law and Technology
No abstract provided.
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Fbi's Carnivore: Under The Fourth Amendment And The Usa Patriot Act, Scott Griner
Oklahoma Journal of Law and Technology
No abstract provided.
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Emailer Beware: The Fourth Amendment And Electronic Mail, E. Parker Lowe
Oklahoma Journal of Law and Technology
No abstract provided.
Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee
Yershov V. Gannett: Rethinking The Vppa In The 21st Century, Ariel A. Pardee
Maine Law Review
Almost anyone with a smartphone can recall a time when an online advertisement followed them from webpage to webpage, or mobile browser to mobile application, or even jumped from a mobile device to a desktop web browser. While some people see it as a harmless—or even helpful—quirk of the online world, others find it creepy and intrusive. In the absence of significant government regulation of online advertising practices, particularly aggrieved individuals have sought relief in the courts by alleging violations of ill-fitting statutes drafted decades ago. This note explores just such a case, Yershov v. Gannett, in which the First …
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
The Sky Is Not Falling: An Analysis Of The National Strategy For Trusted Identities In Cyberspace And The Proposed Identity Ecosystem, Aaron L. Jackson
Oklahoma Journal of Law and Technology
No abstract provided.
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies
Indiana Journal of Global Legal Studies
To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
The Freedom From Sexploitation Agenda: Policy And Legislative Recommendations To Curb Sexual Exploitation, Dawn Hawkins
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Judicial Oversight Of Interception Of Communications In The United Kingdom: An Historical And Comparative Analysis, David G. Barnum
Georgia Journal of International & Comparative Law
No abstract provided.
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
Automating Threat Sharing: How Companies Can Best Ensure Liability Protection When Sharing Cyber Threat Information With Other Companies Or Organizations, Ari Schwartz, Sejal C. Shah, Matthew H. Mackenzie, Sheena Thomas, Tara Sugiyama Potashnik, Bri Law
University of Michigan Journal of Law Reform
This Article takes an in-depth look at the evolution of cybersecurity information sharing legislation, leading to the recent passage of the Cybersecurity Information Sharing Act (CISA) and offers insights into how automated information sharing mechanisms and associated requirements implemented pursuant to CISA can be leveraged to help ensure liability protections when engaging in cyber threat information sharing with and amongst other non-federal government entities.
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
Digital Technology And Analog Law: Cellular Location Data, The Third-Party Doctrine, And The Law's Need To Evolve, Justin Hill
University of Richmond Law Review
No abstract provided.
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Targeted Advertising And The First Amendment: Student Privacy Vs. Protected Speech, Marco Crocetti
Catholic University Journal of Law and Technology
No abstract provided.
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
Cloudy With A Chance Of Abused Privacy Rights: Modifying Third-Party Fourth Amendment Standing Doctrine Post-Spokeo, Sarah E. Pugh
American University Law Review
No abstract provided.
Flagging The Middle Ground Of The Right To Be Forgotten: Combatting Old News With Search Engine Flags, Hannah L. Cook
Flagging The Middle Ground Of The Right To Be Forgotten: Combatting Old News With Search Engine Flags, Hannah L. Cook
Vanderbilt Journal of Entertainment & Technology Law
Incomplete and outdated news articles present an increasing problem for individuals who find themselves stigmatized on the basis of truthful but misleading reports. This Article proposes a moderate solution between the European right to be forgotten and the protectionless status quo in the United States. It proposes a flagging system, administered through Federal Trade Commission adjudications, where links to articles whose private harms outweigh their public benefits are flagged in the search results of an individual. This flag will help combat psychological biases that may cause decisionmakers to place an irrational weight on these articles while preserving the ability of …
The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan
The Privacy, Probability, And Political Pitfalls Of Universal Dna Collection, Meghan J. Ryan
SMU Science and Technology Law Review
Watson and Crick’s discovery of the structure of DNA (deoxyribonucleic acid) in 1953 launched a truth-finding mission not only in science but also in the law. Just thirty years later–after the science had evolved–DNA evidence was being introduced in criminal courts. Today, DNA evidence is heavily relied on in criminal and related cases. It is routinely introduced in murder and rape cases as evidence of guilt; DNA databases have grown as even arrestees have been required to surrender DNA samples; and this evidence has been used to exonerate hundreds of convicted individuals. DNA evidence is generally revered as the “gold …