Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Cybersecurity (2)
- 3D-Printed Firearms (1)
- All Other Telecommunications (1)
- Beta (Video format) (1)
- Censorship -- Government policy (1)
-
- Computer Systems Design Services (1)
- Computer hacking (1)
- Computer-aided design (1)
- Critical infrastructure protection (1)
- Cyber threats (1)
- Cyber-terrorism (1)
- Cyberattacks (1)
- Data (1)
- Data encryption (Computer science) (1)
- Defense Distributed (Company) (1)
- Extremism (1)
- Global economics (1)
- Incitement (1)
- Information Policy (1)
- International law (1)
- International security (1)
- Internet (1)
- Islamic State (1)
- Liberator pistol (1)
- National Security (1)
- National security -- United States (1)
- Pol (1)
- Propaganda (1)
- Right of privacy (1)
- Searches & seizures (Law) (1)
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Law
Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto
Big Data, Bigger Dilemmas: A Critical Review, Hamid Ekbia, Michael Mattioli, Inna Koupe, G. Arave, Ali Ghazinejad, Timothy Bowman, Venkatq R. Suri, Tsou Andrew, Scott Weingart, Cassidy R. Sugimoto
Articles by Maurer Faculty
The recent interest in Big Data has generated a broad range of new academic, corporate, and policy practices along with an evolving debate among its proponents, detractors, and skeptics. While the practices draw on a common set of tools, techniques, and technologies, most contributions to the debate come either from a particular disciplinary perspective or with a focus on a domain-specific issue. A close examination of these contributions reveals a set of common problematics that arise in various guises and in different places. It also demonstrates the need for a critical synthesis of the conceptual and practical dilemmas surrounding Big …
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans
Unlocked And Loaded: Government Censorship Of 3d-Printed Firearms And A Proposal For More Reasonable Regulation Of 3d-Printed Goods, Danton L. Bryans
Indiana Law Journal
This Comment analyzes the regulations in place on 3D-printed firearms and proposes a new standard for regulating 3D-printed goods. Part I provides a brief primer on 3D printing and 3D-printed firearms. Part II turns to the events surrounding Defense Distributed’s creation of the world’s first 3D-printed firearm and the subsequent government censorship of the corresponding CAD files. Part III discusses the regulations affecting 3D-printed firearms and why these regulations are ill-suited for CAD files and 3D-printed goods. Part IV analyzes the implications of treating CAD files and 3D-printed goods as equivalents of traditional goods. Finally, Part V offers a proposal …
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Furtive Encryption: Power, Trusts, And The Constitutional Cost Of Collective Surveillance, Jeffrey L. Vagle
Indiana Law Journal
Recent revelations of heretofore secret U.S. government surveillance programs have sparked national conversations about their constitutionality and the delicate balance between security and civil liberties in a constitutional democracy. Among the revealed policies asserted by the National Security Agency (NSA) is a provision found in the “minimization procedures” required under section 702 of the Foreign Intelligence Surveillance Act of 1978. This provision allows the NSA to collect and keep indefinitely any encrypted information collected from domestic communications—including the communications of U.S. citizens. That is, according to the U.S. government, the mere fact that a U.S. citizen has encrypted her electronic …
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Hacking The Wealth Of Nations: Managing Markets Amid Malware, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Countering Islamic State Exploitation Of The Internet, David P. Fidler
Articles by Maurer Faculty
No abstract provided.
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Whither The Web?: International Law, Cybersecurity, And Critical Infrastructure Protection, David P. Fidler
Articles by Maurer Faculty
No abstract provided.