Open Access. Powered by Scholars. Published by Universities.®

Computer Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Maurer School of Law: Indiana University

Discipline
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 88

Full-Text Articles in Computer Law

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin Jul 2023

Cyber Plungers: Colonial Pipeline And The Case For An Omnibus Cybersecurity Legislation, Asaf Lubin

Articles by Maurer Faculty

The May 2021 ransomware attack on Colonial Pipeline was a wake-up call for a federal administration slow to realize the dangers that cybersecurity threats pose to our critical national infrastructure. The attack forced hundreds of thousands of Americans along the east coast to stand in endless lines for gas, spiking both prices and public fears. These stressors on our economy and supply chains triggered emergency proclamations in four states, including Georgia. That a single cyberattack could lead to a national emergency of this magnitude was seen by many as proof of even more crippling threats to come. Executive Director of …


Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle Jan 2023

Strengthening Our Intuitions About Hacking, Jeffrey L. Vagle

Indiana Law Journal

The computer trespass analogy has served us reasonably well as a basis for cybersecurity policies and related anti-hacking laws, but computers, and our uses of them, have changed significantly in ways that stretch the computer trespass metaphor beyond usefulness. This Essay proposes an approach to expanding and strengthening our intuitions about computer security that accounts for new computing paradigms, giving courts and lawmakers additional tools for interpreting and drafting effective anti-hacking laws.

This Essay argues that many new and existing computer use scenarios leave courts unsure how existing anti-hacking laws might apply, increasing the possibility of under- or over-inclusive policies …


What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells Apr 2021

What's The Harm? Federalism, The Separation Of Powers, And Standing In Data Breach Litigation, Grayson Wells

Indiana Law Journal

This Comment will argue that the Supreme Court should analyze standing in data breach litigation under a standard that is deferential to state statutory and common law. Specifically, federal standing analysis should look to state law when determining whether an injury is concrete such that the injury-in-fact requirement is met. Some argue that allowing more data breach cases to proceed to the merits could lead to an explosion of successful litigation and settlements, burdening the federal courts and causing economic losses for the breached businesses. These concerns may be valid. But if state law provides a remedy to the harm …


Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish Nov 2018

Dean's Desk: Iu Maurer Programs Supporting Careers In Cybersecurity, Austen L. Parrish

Austen Parrish (2014-2022)

A recent Bureau of Labor Statistics report estimated a near 30 percent growth in coming years for information security professionals, far outpacing most other job types. While Indiana University has long recognized the importance of data security and privacy, multiple new initiatives are ensuring that the next generation of chief information security officers, systems analysts, privacy professionals and others will come from our law school.

One of the ways the law school is leading the way is through the university’s new master of science in cybersecurity risk management. That degree program combines the resources of three of IU’s top-ranked schools …


Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies Aug 2017

Global Cybersecurity, Surveillance, And Privacy: The Obama Administration's Conflicted Legacy, Peter Margulies

Indiana Journal of Global Legal Studies

To analyze the Obama administration's cyber efforts, this Article proposes a paradigm of stewardship with both discursive and structural dimensions. Discursive stewardship refers to the Executive's openness to dialogue with other stakeholders. Structural stewardship refers to the domestic and transnational distribution of decisional authority, including checks and balances that guard against the excesses of unilateral action. The Article concludes that the Obama administration made substantial progress in each of these realms. However, the outsized role of law enforcement agendas and dearth of clearly articulated checks on transnational surveillance drove headwinds that limited forward movement.


The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler Jan 2017

The U.S. Election Hacks, Cybersecurity, And International Law, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Transforming Election Cybersecurity, David P. Fidler Jan 2017

Transforming Election Cybersecurity, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir Jan 2016

A Comprehensive Empirical Study Of Data Privacy, Trust, And Consumer Autonomy, Jay P. Kesan, Carol M. Hayes, Masooda N. Bashir

Indiana Law Journal

Modern society is driven by data. Data storage is practically unlimited with today’s technology, and analytical tools make it easy to find patterns and make predictions in a way that is very useful for private businesses and governments. These uses of digital data can raise considerable privacy issues that are of great concern to consumers. In this Article, we present and analyze the results of an extensive survey that we conducted to explore what people know, what people do, and what people want when it comes to privacy online.

Our survey is the first comprehensive examination of the intersection of …


Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto Aug 2015

Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto

Articles by Maurer Faculty

The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big …


Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans Apr 2015

Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans

Indiana Law Journal

This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …


Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle Jan 2015

Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle

Indiana Law Journal

Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …


Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler Jan 2015

Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Countering Islamic State Exploitation Of The Internet, David P. Fidler Jan 2015

Countering Islamic State Exploitation Of The Internet, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler Jan 2015

Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun Nov 2014

Conceptualizing Copyright Enforcement And Management In The Digital Age Through Two Models: The Right-Holder-Centric Model And Cooperative Model, Yang Sun

Maurer Theses and Dissertations

This dissertation focuses on the issues of copyright enforcement and management. Especially, the research looks into how the digital technology reshapes the general perceptions and landscape of the copyright system in terms of online enforcement and management. Stepping into the digital age, the interaction between copyright holders and other parties, including online users and the ISPs, establishes two coexisting models—the right-holder-centric model and the cooperative model. Therefore, the dissertation analyzes which model is more appropriate and efficient with respect to online copyright enforcement and management.

As a matter of fact, the coexistences of two models provides copyright holders and other …


Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney Jan 2014

Cybersecurity And The Administrative National Security State: Framing The Issues For Federal Legislation, David G. Delaney

Articles by Maurer Faculty

In the digital age, every part of federal government has critical cybersecurity interests. Many of those issues are brought into sharp focus by Edward Snowden's disclosure of sensitive government cyber intelligence programs conducted by the National Security Agency, the Federal Bureau of Investigation, and the Central Intelligence Agency. Courts are reviewing various constitutional and statutory challenges to those programs, two government review groups have reported on related legal and policy issues, and Congress is considering cyber intelligence reform proposals. All of this action comes on the heels of significant efforts by successive administrations to restructure government and pass comprehensive cybersecurity …


Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler Jan 2014

Le Cyberspace, C'Est Moi?: Authoritarian Leaders, The Internet, And International Politics, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia Oct 2013

A New Approach To Digital Reader Privacy; State Regulations And Their Protection Of Digital Book Data, Andrew A. Proia

Indiana Law Journal

No abstract provided.


Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler Jul 2013

Mind The Gap: Explaining Problems With International Law Where Cybersecurity And Critical Infrastructure Protection Meet, David P. Fidler

Articles by Maurer Faculty

No abstract provided.


The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva Apr 2013

The Granting Clause And Intellectual Property Rights Management In Open-Source Software Licensing, Vikrant N. Vasudeva

IP Theory

No abstract provided.


Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger Jan 2013

Data Protection Principles For The 21st Century, Fred H. Cate, Peter Cullen, Viktor Mayer-Schonberger

Books & Book Chapters by Maurer Faculty

This paper proposes revisions to the OECD Guidelines that include basic changes essential for the protection of individual privacy in the 21st century, while avoiding unnecessary restrictions on uses of personal information that are increasingly important.


Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong Jan 2013

Leap-Ahead Privacy As A Government Responsibility In The Digital Age, David G. Delaney, Ivan K. Fong

Articles by Maurer Faculty

No abstract provided.


The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

The Business Of Privacy, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson Jan 2013

Face-To-Data -- Another Developing Privacy Threat?, Fred H. Cate, Christopher Kuner, Christopher Millard, Dan Jerker B. Svantesson

Articles by Maurer Faculty

No abstract provided.


Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme Jan 2013

Nato, Cyber Defense, And International Law, David P. Fidler, Richard Pregent, Alex Vandurme

Articles by Maurer Faculty

Cybersecurity threats pose challenges to individuals, corporations, states, and intergovernmental organizations. The emergence of these threats also presents international cooperation on security with difficult tasks. This essay analyzes how cybersecurity threats affect the North Atlantic Treaty Organization (NATO), which is arguably the most important collective defense alliance in the world.1 NATO has responded to the cyber threat in policy and operational terms (Part I), but approaches and shifts in cybersecurity policies create problems for NATO— problems that NATO principles, practices, and politics exacerbate in ways that will force NATO to address cyber threats more aggressively than it has done so …


Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying Oct 2012

Why Copyright Falls Behind The Requirement For Protecting Graphic User Interfaces: Case Studies On Limitations Of Copyright Protection For Guis In China, Ling Jin, Yihong Ying

IP Theory

No abstract provided.


“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez Jul 2012

“Advancing With The Times: Industrial Design Protection In The Era Of Virtual Migration”, Horacio E. Gutiérrez

IP Theory

No abstract provided.


An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub May 2012

An End To End-To-End? A Review Essay Of Barbara Van Schewick’S Internet Architecture And Innovation, Adam Candeub

Federal Communications Law Journal

Amidst much controversy, the FCC released its landmark "network neutrality" order in December 2010. This regulation prohibits Internet service providers, such as Verizon or Comcast, from discriminating in favor of traffic or content that they own or with which they are affiliated. Professor Barbara van Schewick's recently published book, Internet Architecture and Innovation, could not be timelier. Employing a variety of economic and technical arguments, van Schewick defends the type of regulation the FCC passed as necessary to preserve the Internet's potential for innovation. My central critique of Internet Architecture is its deployment of economic theories on one side of …


The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund Jan 2012

The End Of Forgetting And "Administrative Rights" To Our Online Personas, Jamie R. Lund

IP Theory

No abstract provided.


Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair Jan 2012

Openness, Intellectual Property And Standardization In The European Ict Sector, Carl Mair

IP Theory

No abstract provided.