Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Internet Law (79)
- Computer Sciences (56)
- Physical Sciences and Mathematics (56)
- Information Security (51)
- Science and Technology Law (51)
-
- Social and Behavioral Sciences (46)
- Engineering (43)
- Computer Engineering (39)
- Privacy Law (37)
- Electrical and Computer Engineering (36)
- Forensic Science and Technology (36)
- Intellectual Property Law (36)
- Legal Studies (36)
- International Law (14)
- Consumer Protection Law (13)
- Constitutional Law (10)
- First Amendment (10)
- Communications Law (9)
- Contracts (9)
- Law and Society (9)
- Commercial Law (8)
- Comparative and Foreign Law (7)
- Criminal Law (7)
- Legal Writing and Research (6)
- Litigation (6)
- Marketing Law (6)
- Administrative Law (5)
- Business (5)
- Institution
-
- Embry-Riddle Aeronautical University (48)
- UIC School of Law (21)
- Selected Works (18)
- SelectedWorks (15)
- Schulich School of Law, Dalhousie University (12)
-
- Maurer School of Law: Indiana University (8)
- Pepperdine University (6)
- University of Maryland Francis King Carey School of Law (6)
- Pace University (3)
- Seattle University School of Law (3)
- American University Washington College of Law (2)
- Chicago-Kent College of Law (2)
- Loyola University Chicago, School of Law (2)
- Northwestern Pritzker School of Law (2)
- SJ Quinney College of Law, University of Utah (2)
- University of Georgia School of Law (2)
- University of Pennsylvania Carey Law School (2)
- University of Pittsburgh School of Law (2)
- University of Richmond (2)
- University of Washington School of Law (2)
- University of the Pacific (2)
- California State University, San Bernardino (1)
- Columbia Law School (1)
- Fordham Law School (1)
- Georgetown University Law Center (1)
- Penn State Law (1)
- Singapore Management University (1)
- Touro University Jacob D. Fuchsberg Law Center (1)
- Vanderbilt University Law School (1)
- Washington and Lee University School of Law (1)
- Keyword
-
- Privacy (13)
- Computer Law (12)
- Law and Technology (10)
- Internet (8)
- Copyright (7)
-
- Cybersecurity (6)
- First Amendment (6)
- Intellectual Property Law (6)
- Data protection (5)
- Google (5)
- Science and Technology (5)
- Communications Law (4)
- Computers (4)
- Constitutional Law (4)
- Consumer Protection Law (4)
- Data privacy (4)
- Evidence (4)
- Facebook (4)
- Risk (4)
- Computer (3)
- Contracts (3)
- Cybercrime (3)
- Digital forensics (3)
- Discovery (3)
- Social Implications of ICT (3)
- Social media (3)
- Software (3)
- Threat (3)
- Automated Psychological assessment (2)
- Cloud computing (2)
- Publication
-
- Journal of Digital Forensics, Security and Law (35)
- UIC John Marshall Journal of Information Technology & Privacy Law (14)
- Annual ADFSL Conference on Digital Forensics, Security and Law (13)
- Canadian Journal of Law and Technology (11)
- Articles by Maurer Faculty (5)
-
- Journal of Business & Technology Law (4)
- UIC Review of Intellectual Property Law (4)
- All Faculty Scholarship (3)
- Journal of the National Association of Administrative Law Judiciary (3)
- Pepperdine Law Review (3)
- Professor Katina Michael (3)
- Rodolfo C. Rivas (3)
- Articles (2)
- Articles in Law Reviews & Other Academic Journals (2)
- Children's Legal Rights Journal (2)
- Curtis E.A. Karnow (2)
- Faculty Scholarship (2)
- Frank A. Pasquale (2)
- Georgia Journal of International & Comparative Law (2)
- Guido Noto La Diega (2)
- Jonathan I. Ezor (2)
- McGeorge Law Review (2)
- Northwestern Journal of Technology and Intellectual Property (2)
- Richmond Journal of Law & Technology (2)
- Seattle University Law Review (2)
- Technology Law and Public Policy Clinic (2)
- UIC Law Review (2)
- Utah OnLaw: The Utah Law Review Online Supplement (2)
- Abu Noman Mohammad Atahar Ali (1)
- Allyson Haynes Stuart (1)
Articles 1 - 30 of 171
Full-Text Articles in Computer Law
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Stymieing Controversy Over Generic Top-Level Domains (Gtlds) And Other Internet Governance Decisions With Content Neutrality, Nafees Uddin
Seattle Journal for Social Justice
No abstract provided.
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
The Copyrightability Of Nonliteral Elements Of Computer Programs, Julian Velasco
Julian Velasco
No abstract provided.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Lo Que Siempre Quiso Saber Sobre... Nombres De Dominio Pero Nunca Se Atrevió A Preguntar, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors provide a brief overview of the domain name system and its dispute resolution regulation. The authors then delve into the new gTLDs and tackle some of the questions brought forward by its imminent introduction. /////////////////////////////////////////////////////////////////////////////////////////////////////////////// Los autores ofrecen un panorama general del sistema de nombres de dominio y la regulación de sus procedimientos de solución de controversias. Posteriormente, los autores profundizan en los nuevos gTLDs y tratan de responder a algunas de las preguntas presentadas por su inminente introducción.
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Should The Default Be "Social"? Canada's Pushback Against Oversharing By Facebook, Karen Tanenbaum
Georgia Journal of International & Comparative Law
No abstract provided.
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
The Uncharted Waters Of Cyberspace: Applying The Principles Of International Maritime Law To The Problem Of Cybersecurity, William M. Stahl
Georgia Journal of International & Comparative Law
No abstract provided.
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Guidelines To Limit Criminal Prosecutions Of Filesharing Services, Benton C. Martin, Jeremiah R. Newhall
Benton C. Martin
This short essay acknowledges certain efficiencies in enforcing copyright law against "secondary" infringers like filesharing services through criminal proceedings, but it proposes guidelines for prosecutors to use in limiting prosecutions against this type of infringer.
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
E-Commerce And Electronic Payment System Risks: Lessons From Paypal, Lawrence J. Trautman
Lawrence J. Trautman Sr.
What are the major risks perceived by those engaged in e-commerce and electronic payment systems? What development risks, if they become reality, may cause substantial increases in operating costs or threaten the very survival of the enterprise? This article utilizes the relevant annual report disclosures from eBay (parent of PayPal), along with other eBay and PayPal documents, as a potentially powerful teaching device. Most of the descriptive language to follow is excerpted directly from eBay’s regulatory filings. My additions include weaving these materials into a logical presentation and providing supplemental sources for those who desire a deeper look (usually in …
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Flawed Transparency: Shared Data Collection And Disclosure Challenges For Google Glass And Similar Technologies, Jonathan I. Ezor
Jonathan I. Ezor
Current privacy law and best practices assume that the party collecting the data is able to describe and disclose its practices to those from and about whom the data are collected. With emerging technologies such as Google Glass, the information being collected by the wearer may be automatically shared to one or more third parties whose use may be substantially different from that of the wearer. Often, the wearer may not even know what information is being uploaded, and how it may be used. This paper will analyze the current state of U.S. law and compliance regarding personal information collection …
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia
Indiana Law Journal
No abstract provided.
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
The Singapore Personal Data Protection Act And An Assessment Of Future Trends In Data Privacy, Warren B. Chik
Research Collection Yong Pung How School Of Law
In the first part of this paper, I will present and explain the Singapore Personal Data Protection Act (“PDPA”) in the context of legislative developments in the Asian region and against the well-established international baseline privacy standards. In the course of the above evaluation, reference will be made to the national laws and policy on data privacy prior to the enactment of the PDPA as well as current social and market practices in relation to personal data. In the second part of this paper, I will decipher and assess the future trends in data privacy reform and the future development …
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Money Laundering Detection Framework To Link The Disparate And Evolving Schemes, Murad Mehmet, Duminda Wijesekera, Miguel F. Buchholtz
Journal of Digital Forensics, Security and Law
Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing …
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
Navigating Through The Fog Of Cloud Computing Contracts, T. Noble Foster
T. Noble Foster
This paper explores legal issues associated with cloud computing, provides analysis and commentary on typical clauses found in contracts offered by well-known cloud service providers, and identifies strategies to mitigate the risk of exposure to cloud-based legal claims in the critical areas of data security, privacy, and confidentiality. While current research offers numerous case studies, viewpoints, and technical descriptions of cloud processes, our research provides a close examination of the language used in cloud contract terms. Analysis of these contract terms supports the finding that most standard cloud computing contracts are unevenly balanced in favor of the cloud service provider. …
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Tor Exit Nodes: Legal And Policy Considerations, Sarah Campbell Eagle, Abigail St. Hilaire, Kelly Sherwood
Technology Law and Public Policy Clinic
Anonymity Networks
The Internet is a constant companion to people the world over and as technology improves it is becoming more accessible every day. With the amount of communication that occurs online, it was only a matter of time before anonymity became an important topic of discussion. Several so-called “anonymity networks” have been developed to facilitate anonymous communication by the citizens of the web. Because the use of these networks is already so widespread, the time is ripe for a discussion of their merits and potential government responses to this phenomenon. An anonymity network “enables users to access the Web …
International Cryptography Regulation And The Global Information Economy, Nathan Saper
International Cryptography Regulation And The Global Information Economy, Nathan Saper
Northwestern Journal of Technology and Intellectual Property
With the meteoric rise of the Internet and e-commerce in the 1990s came great attention to the problems and opportunities associated with cryptography. Throughout that decade, the United States and many foreign countries debated and experimented with various forms of cryptography regulation, and attempts were made at international harmonization. Since then, however, policy-making activity around cryptography has slowed, if not halted altogether, leaving individuals and companies to face a bewildering array of regulations—or, in many cases, to face regulations that are extraordinarily unclear and haphazardly applied.
This Note seeks to introduce the reader to the issue of international cryptography regulation …
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
The Collision Of Social Media And Social Unrest: Why Shutting Down Social Media Is The Wrong Response, Mirae Yang
Northwestern Journal of Technology and Intellectual Property
With the growing availability of Internet access across the globe, social media has transformed the traditional relationship between government authority and its citizens by providing the people with an innovative and powerful means to harmonize their efforts in expressing their political and social concerns. The importance of safeguarding Internet availability is more critical than ever before as access to the Internet is now the means by which the world communicates, stays informed, and engages in daily tasks. In the face of potential social unrest fueled by social media, the United States must take a preventative approach, one that matches our …
What To Do About Google?, James Grimmelmann
What To Do About Google?, James Grimmelmann
James Grimmelmann
Observers have debated whether is a conduit for websites' speech or an editor that speaks for itself. The best answer is neither: search engines should be advisors helping their users find the websites they seek. Good search engine policy would put users first; I give examples including search bias and user privacy.
A Comprehensive Approach To Bridging The Gap Between Cyberbullying Rules And Regulations And The Protections Offered By The First Amendment For Off-Campus Student Speech, Vahagn Amirian
Vahagn Amirian
No abstract provided.
Rankings, Reductionism, And Responsibility , Frank Pasquale
Rankings, Reductionism, And Responsibility , Frank Pasquale
Frank A. Pasquale
After discussing how search engines operate in Part I below, and setting forth a normative basis for regulation of their results in Part II, this piece proposes (in Part III) some minor, non-intrusive legal remedies for those who claim that they are harmed by search engine results. Such harms include unwanted high-ranking results relating to them, or exclusion from a page they claim it is their “due” to appear on. In the first case (deemed “inclusion harm”), I propose a right not to suppress the results, but merely to add an asterisk to the hyperlink directing web users to them, …
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Beyond Innovation And Competition: The Need For Qualified Transparency In Internet Intermediaries, Frank Pasquale
Frank A. Pasquale
Internet service providers and search engines have mapped the web, accelerated e-commerce, and empowered new communities. They also pose new challenges for law. Individuals are rapidly losing the ability to affect their own image on the web - or even to know what data are presented about them. When web users attempt to find information or entertainment, they have little assurance that a carrier or search engine is not biasing the presentation of results in accordance with its own commercial interests. Technology’s impact on privacy and democratic culture needs to be at the center of internet policy-making. Yet before they …
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Finding Privacy In A Sea Of Social Media And Other E-Discovery, Allyson Haynes Stuart
Allyson Haynes Stuart
This article looks at the case law governing discovery of social media, and finds several problems. First, many courts are improperly requiring a threshold showing that relevant information exists in public portions of the user’s social media account before allowing such discovery. Second, they allow overbroad discovery, often requiring a litigant to turn over its username and password to the other party. At the same time, parties are seeking such information directly from social media sites, attempting an end-run around the relevancy requirement and increasing motion practice. The article argues that, instead, social media discovery should be treated like other …
The Taxation Of Cloud Computing And Digital Content, David Shakow
The Taxation Of Cloud Computing And Digital Content, David Shakow
All Faculty Scholarship
“Cloud computing” raises important and difficult questions in state tax law, and for Federal taxes, particularly in the foreign tax area. As cloud computing solutions are adopted by businesses, items we view as tangible are transformed into digital products. In this article, I will describe the problems cloud computing poses for tax systems. I will show how current law is applied to cloud computing and will identify the difficulties current approaches face as they are applied to this developing technology.
My primary interest is how Federal tax law applies to cloud computing, particularly as the new technology affects international transactions. …
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Costing A Pretty Penny: Online Penny Auctions Revive The Pestilence Of Unregulated Lotteries, David R. Konkel
Seattle University Law Review
Penny auctions, an online phenomenon imported from Europe, operate by the hundreds in the United States without meaningful oversight from consumer protection agencies. In a penny auction, consumers compete for items one penny at a time. To date, no significant inquiry, either academic or practical, into the legitimacy of the penny auction has occurred. Although marketed as auctions, online penny auctions may actually qualify as lotteries. Unlike the multifarious and confusing definitions of gambling, the long-accepted definition of a lottery consists of three elements: prize, consideration, and chance. If a penny auction satisfies this definition then, under well-established case law …
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Migración A La Nube: ¿Está Segura Nuestra Información?, Rodolfo C. Rivas Rea Esq., Marco A. Vargas Iñiguez Esq.
Rodolfo C. Rivas
The authors discuss the benefits and risks of moving your business data to the cloud through case studies and offer practical tips to protect business confidential information stored in the cloud. //////////////////////// Los autores estudian los beneficios y los riesgos de almacenar datos e información en la nube a través de casos de estudio y ofrecen consejos prácticos para proteger la información comercial confidencial almacenada en la nube.