Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (9)
- Computer Sciences (4)
- Physical Sciences and Mathematics (4)
- Science and Technology Law (4)
- Social and Behavioral Sciences (4)
-
- Communication (3)
- Constitutional Law (3)
- Information Security (3)
- International Law (3)
- Law and Economics (3)
- Privacy Law (3)
- Antitrust and Trade Regulation (2)
- Business (2)
- Communication Technology and New Media (2)
- Criminal Law (2)
- Entertainment, Arts, and Sports Law (2)
- Legal Writing and Research (2)
- Public Affairs, Public Policy and Public Administration (2)
- Science and Technology Policy (2)
- Accounting Law (1)
- Administrative Law (1)
- Artificial Intelligence and Robotics (1)
- Arts and Humanities (1)
- Asian Studies (1)
- Communications Law (1)
- Comparative and Foreign Law (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Institution
- Keyword
-
- Cybersecurity (4)
- Data privacy (3)
- Data protection (3)
- Computers (2)
- Cybercrime (2)
-
- Market power (2)
- Personal data (2)
- Privacy (2)
- 17 U.S.C. § 110(1) (1)
- Age (1)
- Allocative efficiency (1)
- Amazon (1)
- Antitrust liability (1)
- Appeals (1)
- Armed Services (1)
- Aroow's paradox (1)
- Artificial intelligence and law (1)
- Assisted suicide (1)
- Biometrics (1)
- CFAA (1)
- CIP (1)
- Cell phones (1)
- Child pornography (1)
- Children (1)
- Classroom (1)
- Collecting tax judgments in foreign court (1)
- Comcast Corp. v. FCC (1)
- Commercial speech (1)
- Common carriers (1)
- Competition (1)
Articles 1 - 21 of 21
Full-Text Articles in Computer Law
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
The Taxation Of Cloud Computing And Digital Content, David Shakow
The Taxation Of Cloud Computing And Digital Content, David Shakow
All Faculty Scholarship
“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.
My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
Beyond Notice And Choice: Privacy, Norms, And Consent, Richard Warner, Robert Sloan
All Faculty Scholarship
Informational privacy is the ability to determine for yourself when and how others may collect and use your information. Adequate informational privacy requires a sufficiently broad ability to give or withhold free and informed consent to proposed uses.
Notice and Choice (sometimes also called “notice and consent”) is the current paradigm for consent online. The Notice is a presentation of terms, typically in a privacy policy or terms of use agreement. The Choice is an action signifying acceptance of the terms, typically clicking on an “I agree” button, or simply using the website. Recent reports by the Federal Trade Commission …
The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca
The Need For International Laws Of War To Include Cyber Attacks Involving State And Non-State Actors, Christopher D. Deluca
Pace International Law Review Online Companion
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use of cyber attacks in international conflicts. Part III focuses on the importance and relevance of non-state actors in the international community and today’s asymmetric battlefield. Part IV discusses the applicability of current international laws of war to cyber attacks. Part V of this article suggests ways in which current international law can be improved to include and regulate cyber attacks …
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Pass Parallel Privacy Standards Or Privacy Perishes, Anne T. Mckenna
Journal Articles
No abstract provided.
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
The Law And Science Of Video Game Violence: What Was Lost In Translation?, 31 Cardozo Arts & Ent. L.J. 297 (2013), William K. Ford
UIC Law Open Access Faculty Scholarship
"[A]s a general rule," writes Pulitzer Prize-winning journalist Edward Humes, "courts don't do science very well."' Susan Haack, a professor of law and philosophy, elaborates on why this may be true, offering several reasons for "deep tensions" between science and law. The reasons offered by Haack may be less of a concern where the dispute involves litigation against the government on significant questions of public policy. Recent decisions assessing the constitutionality of laws restricting minors' access to violent video games therefore offer an opportunity to examine how well the courts handled scientific evidence in a situation lacking some of the …
Giving Purpose To Your Life As A Legal Writer, David Spratt
Giving Purpose To Your Life As A Legal Writer, David Spratt
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor
Streaming While Teaching: The Legality Of Using Person Streaming Video Accounts For The Classroom, Jonathan I. Ezor
Scholarly Works
Educators are constantly seeking new sources of relevant material to illustrate doctrinal and practice topics. With the growing understanding of students’ different learning styles, as well as the expansion of high-speed network connections and large displays in the classroom, streaming video has begun gaining popularity as an educational tool. Films, television programs, and real-time and archived legislative and court sessions may provide examples (both positive and negative) to enhance pedagogy. One increasingly common source for streaming content is a commercial video provider such as Netflix, Amazon, and Hulu. Even where such providers do not offer educational or institutional services, educators …
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Criminalizing Hacking, Not Dating: Reconstructing The Cfaa Intent Requirement, David Thaw
Articles
Cybercrime is a growing problem in the United States and worldwide. Many questions remain unanswered as to the proper role and scope of criminal law in addressing socially-undesirable actions affecting and conducted through the use of computers and modern information technologies. This Article tackles perhaps the most exigent question in U.S. cybercrime law, the scope of activities that should be subject to criminal sanction under the Computer Fraud and Abuse Act (CFAA), the federal "anti-hacking" statute.
At the core of current CFAA debate is the question of whether private contracts, such as website "Terms of Use" or organizational "Acceptable Use …
The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page
The Asbca's Path To The Mega Adr In Computer Sciences Corporation, Paul Williams, Reba Ann Page
Articles in Law Reviews & Other Academic Journals
No abstract provided.
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme
Articles by Maurer Faculty
Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
From Peer-To-Peer Networks To Cloud Computing: How Technology Is Redefining Child Pornography Laws, Audrey Rogers
Elisabeth Haub School of Law Faculty Publications
This Article traces the history of the child pornography laws and sentencing policy in Part I. Part II explains the technologies that have caused some of the current controversies, and then Part III describes how these technologies have blurred the offenses. Finally, Part IV makes suggestions as to how the law could better reflect technology and comport with a refined harm rationale. Courts, legal scholars, and medical experts have explained the harm includes the sexual abuse captured in the images and the psychological injury the victim endures knowing the images are being viewed. This Article further develops the harm rationale …
Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley
Teaching Law And Digital Age Legal Practice With An Ai And Law Seminar: Justice, Lawyering And Legal Education In The Digital Age, Kevin D. Ashley
Articles
A seminar on Artificial Intelligence ("Al") and Law can teach law students lessons about legal reasoning and legal practice in the digital age. Al and Law is a subfield of Al/computer science research that focuses on designing computer programs—computational models—that perform legal reasoning. These computational models are used in building tools to assist in legal practice and pedagogy and in studying legal reasoning in order to contribute to cognitive science and jurisprudence. Today, subject to a number of qualifications, computer programs can reason with legal rules, apply legal precedents, and even argue like a legal advocate.
This article provides a …
Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo
Is There A Role For Common Carriage In An Internet-Based World?, Christopher S. Yoo
All Faculty Scholarship
During the course of the network neutrality debate, advocates have proposed extending common carriage regulation to broadband Internet access services. Others have endorsed extending common carriage to a wide range of other Internet-based services, including search engines, cloud computing, Apple devices, online maps, and social networks. All too often, however, those who focus exclusively on the Internet era pay too little attention to the lessons of the legacy of regulated industries, which has long struggled to develop a coherent rationale for determining which industries should be subject to common carriage. Of the four rationales for determining the scope of common …
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong
Articles by Maurer Faculty
No abstract provided.
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson
Articles by Maurer Faculty
No abstract provided.
Google And Search-Engine Market Power, Mark R. Patterson
Google And Search-Engine Market Power, Mark R. Patterson
Faculty Scholarship
A significant and growing body of commentary considers whether possible manipulation of search results by Google could give rise to antitrust liability. Surprisingly, though, little serious attention has been paid to whether Google has market power. Those who favor antitrust scrutiny of Google generally cite its large market share, from which they infer or assume its dominance. Those who are skeptical of competition law’s role in regulating search, on the other hand, usually cite Google’s 'competition is only a click away' mantra to suggest that Google’s market position is precarious. In fact, the issue of Google’s power is more complicated …
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
The Electronic Silk Road: How The Web Binds The World In Commerce, Anupam Chander
Georgetown Law Faculty Publications and Other Works
On the ancient Silk Road, treasure-laden caravans made their arduous way through deserts and mountain passes, establishing trade between Asia and the civilizations of Europe and the Mediterranean. Today’s electronic Silk Roads ferry information across continents, enabling individuals and corporations anywhere to provide or receive services without obtaining a visa. But the legal infrastructure for such trade is yet rudimentary and uncertain. If an event in cyberspace occurs at once everywhere and nowhere, what law applies? How can consumers be protected when engaging with companies across the world?
In this accessible book, cyber-law expert Anupam Chander provides the first thorough …
Machine Speech, Tim Wu
Machine Speech, Tim Wu
Faculty Scholarship
Computers are making an increasing number of important decisions in our lives. They fly airplanes, navigate traffic, and even recommend books. In the process, computers reason through automated algorithms and constantly send and receive information, sometimes in ways that mimic human expression. When can such communications, called here “algorithmic outputs,” claim First Amendment protection?