Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Intellectual Property Law (3)
- Computer Law (2)
- Cyber defense (2)
- Cybersecurity (2)
- Privacy (2)
-
- A better License for Open Source Software (1)
- Active defense (1)
- Apache License (1)
- Artistic License (1)
- Attribution (1)
- BSD (1)
- Banco Mundial (1)
- Best practices (1)
- CIP (1)
- Character (1)
- Communications Law (1)
- Computer (1)
- Computer hacking (1)
- Constitutional Law (1)
- Consumer Protection Law (1)
- Consumer protection (1)
- Convention on Cybercrime (1)
- Convey (1)
- Copyleft (1)
- Copyright Act (1)
- Copyright grant (1)
- Critical infrastructure protection (1)
- Cross-Border (1)
- Cyber threats (1)
- Cyber warfare (1)
- Publication
- Publication Type
Articles 1 - 14 of 14
Full-Text Articles in Computer Law
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
Georgia Journal of International & Comparative Law
No abstract provided.
International Cryptography Regulation And The Global Information Economy, Nathan Saper
International Cryptography Regulation And The Global Information Economy, Nathan Saper
Northwestern Journal of Technology and Intellectual Property
With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.
This Note seeks to introduce the reader to the issue of international cryptography regulation …
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
In The Middle: Creating A Middle Road Between U.S. And Eu Data Protection Policies, Carolyn Hoang
Journal of the National Association of Administrative Law Judiciary
The first section of this paper examines the historical differences that have led to the American approach to privacy and the European approach to privacy. The second section will examine the current U.S. model, and the third section will examine the EU model. Next, the fourth section will compare and contrast the two models. Finally, the last section will argue that the U.S. should have a regulatory agency and describe how that should look and run.
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva
IP Theory
No abstract provided.
Private Fair Use: Strengthening Polish Copyright Protection Of Online Works By Looking To U.S. Copyright Law, Michal Pekala
Private Fair Use: Strengthening Polish Copyright Protection Of Online Works By Looking To U.S. Copyright Law, Michal Pekala
Michal Pekala
No abstract provided.
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Corresponding Evolution: International Law And The Emergence Of Cyber Warfare, Bradley Raboin
Journal of the National Association of Administrative Law Judiciary
No abstract provided.
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Privacy, Transparency & Google's Blurred Glass, Jonathan I. Ezor
Jonathan I. Ezor
No matter the context or jurisdiction, one concept underlies every view of the best practices in data privacy: transparency. The mandate to disclose what personal information is collected, how it is used, and with whom and for what purpose it is shared, is essential to enable informed consent to the collection, along with the other user rights that constitute privacy best practices. Google, which claims to support and offer transparency, is increasingly opaque about its many products and services and the information they collect for it, posing a significant privacy concern.
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger
Books & Book Chapters by Maurer Faculty
This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.
The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca
The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca
Pace International Law Review Online Companion
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use of cyber attacks in international conflicts. Part III focuses on the importance and relevance of non-state actors in the international community and today’s asymmetric battlefield. Part IV discusses the applicability of current international laws of war to cyber attacks. Part V of this article suggests ways in which current international law can be improved to include and regulate cyber attacks …
Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah
Adequate Attribution: A Framework For Developing A National Policy For Private Sector Use Of Active Defense, Shane Mcgee, Randy V. Sabett, Anand Shah
Journal of Business & Technology Law
No abstract provided.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Jurisdiction In Relation To Online Cross-Border Infringements - The Code And The Law, Ulf Maunsbach
Ulf Maunsbach
During recent years the European Court of Justice (ECJ) has proven to be increasingly active in relation to cross-border intellectual property disputes. The relevant cases cover a wide range of issues, from advertisement through use of keywords, to copyright-related issues involved in making protected material available through the Internet. All in all, it might be said that the Internet era has finally reached the Court of Justice. A similar development is visible in Swedish courts. This provides for an unlimited amount of material for further discussion. In this paper I would like to provide a short summary of the recent …
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Oportunidades Para Las Empresas Dentro De La Omc, Rodolfo C. Rivas Rea Esq.
Rodolfo C. Rivas
The author provides a brief overview of the World Trade Organization (WTO), the International Monetary Fund (IMF) and the World Bank (WB) by explaining the context of their interrelationship. Afterwards, the author delves into a brief analysis of Mexico’s role in the International Trade arena and concludes by describing the paths through which the private sector can benefit from the WTO.///////////////////////////////////////////////////////////////////////////////////////El autor pone en contexto la interrelación entre la Organización Mundial del Comercio (OMC) el Banco Mundial (BM) y el Fondo Monetario Internacional (FMI). Posteriormente, el autor describe brevemente el rol de México dentro de las instituciones de Comercio Internacional …