An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition,
2023
National Forensic Sciences University
An Ml Based Digital Forensics Software For Triage Analysis Through Face Recognition, Gaurav Gogia, Parag H. Rughani
Journal of Digital Forensics, Security and Law
Since the past few years, the complexity and heterogeneity of digital crimes has increased exponentially, which has made the digital evidence & digital forensics paramount for both criminal investigation and civil litigation cases. Some of the routine digital forensic analysis tasks are cumbersome and can increase the number of pending cases especially when there is a shortage of domain experts. While the work is not very complex, the sheer scale can be taxing. With the current scenarios and future predictions, crimes are only going to become more complex and the precedent of collecting and examining digital evidence is only going …
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology,
2023
Notre Dame Law School
What You Don’T Know Will Hurt You: Fighting The Privacy Paradox By Designing For Privacy And Enforcing Protective Technology, Perla Khattar
Washington Journal of Law, Technology & Arts
The persistence of the privacy paradox is proof that current industry regulation is insufficient to protect consumer’s privacy. Although consumer choice is essential, we argue that it should not be the main pillar of modern data privacy legislation. This article argues that legislation should aim to protect consumer’s personal data in the first place, while also giving internet users the choice to opt-in to the processing of their information. Ideally, privacy by design principles would be mandated by law, making privacy an essential component of the architecture of every tech-product and service.
Consensus’S Consolidation Conundrum,
2023
Georgetown University Law Center
Consensus’S Consolidation Conundrum, James J. Bernstein
Washington Journal of Law, Technology & Arts
In Part I, this piece will highlight the history, basis, and justifications for blockchain systems over the present version of the internet. This section helps to frame where consensus mechanisms may undermine Web3’s core premise. Part II will describe the fundamentals of consensus mechanisms. Thereafter, in Part III this piece will demonstrate the pitfalls of each system - and why proof of stake is not necessarily better at fighting off some of the risks associated with consensus mechanisms. Finally, in Part IV this article offers an architectural solution: introducing a series of new protocols which would increase the cost of …
Genetic Technologies: Patent Protections & The Case For Technology Transfer,
2023
University of Washington School of Law
Genetic Technologies: Patent Protections & The Case For Technology Transfer, Smitha Gundavajhala
Washington Journal of Law, Technology & Arts
Genetic technologies range in scope from agricultural to medical applications. Most recently, during the COVID-19 pandemic, companies like Moderna developed and patented genetic technologies for diagnostic and therapeutic purposes, like the mRNA vaccine. However, patent protection provides these companies with a monopoly that ultimately limits domestic production of generic versions, thus limiting access to life-saving diagnostics and therapeutics. When a company located in one country files a patent for recognition in another country, it effectively places a hold on production of any technologies covered by that patent’s reach, whether that patent is enforced or not. However, the TRIPS Agreement, the …
“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution,
2023
Pace University Elisabeth Haub School of Law
“Tiktok Told Me I Have Adhd”: Regulatory Outlook For The Telehealth Revolution, Kaitlin Campanini
Washington Journal of Law, Technology & Arts
Telehealth’s expansion during the COVID-19 pandemic has drastically changed the approach to healthcare in the United States. This is particularly true in the behavioral health sector where several behavioral telehealth companies have emerged to treat Attention-Deficit/Hyperactivity Disorder (“ADHD”). These companies utilize a direct-to-consumer (“DTC”) model with a virtual platform that connects subscribing patients to medical providers who can treat them for ADHD. Although this telemedicine model emphasizes convenience and efficiency, the reality is that those benefits come at the cost of patient care. The federal regulations promulgated in the Ryan Haight Online Pharmacy Consumer Protection Act of 2008 to curtail …
Civil Liability Arising From Hacking E-Mail Information,
2023
Assistant Professor of Civil Law - College of Law University of Science and Technology in Fujairah
Civil Liability Arising From Hacking E-Mail Information, Issa Ghassan Al-Rabdi Dr.
مجلة جامعة الإمارات للبحوث القانونية UAEU LAW JOURNAL
It is completely easy to pass and send any electronic data everywhere to the persons you want in the world in a very quick and short time, regardless the size and the data type.
This is due to the invention of electronic programs that help to save time and efforts. (the E – mail).
As a result of this electronic development in the all related fields that serve humankind, a new encounter technology and illegal use of technology has occurred and used illegally by hackers to destroy and penetrate exclusive information for specific people.
For this illegal hacking attempt requires …
Security-Enhanced Serial Communications,
2023
University of South Florida
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic,
2023
University of Detroit Mercy School of Law
The Exacerbating Role Of Technological And Connectivity Challenges On Older Detroiters’ Health In A Pandemic, Nicholas Schroeck, Carrie Leach
Seattle Journal of Technology, Environmental & Innovation Law
The COVID-19 pandemic hit communities of color hard. The City of Detroit was particularly vulnerable to COVID-19 due to racial, socioeconomic, and environmental health factors. To analyze the exacerbating role of technology and connectivity challenges on older Detroiters' health in a pandemic, we first examined Detroit’s demographics. This analysis involved looking at the continued evolution of the City's population toward older adults, as well as the impact of COVID-19 and the healthcare services on Detroit’s elder population. Next, we examined Detroit’s internet access challenges, including the presence of digital exclusion among older adults in Detroit, the impact of COVID-19 on …
Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence,
2023
Seattle University School of Law
Conviction On Interpretation, Advocate Adaptability, And The Future Of Emojis And Emoticons As Evidence, Samantha Lyons
Seattle Journal of Technology, Environmental & Innovation Law
The dawning of the digital age introduced new and unique interpretive quandaries for judges and litigators alike. These quandaries include (but are not limited to) misinterpretation of pictorial slang as used in instant messaging, new or collateral meanings invented by phrases paired with specific emoticons or emojis, and the existence of emojis alone as communicative accessories.
This Note analyzes how lawyers and judges have essential free reign to treat emojis as they see fit: a prosecutor can argue, even in good faith, that the inclusion of an emoji depicting an open flame means the sender knew the heroin he sold …
From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material,
2023
Seattle University School of Law
From Hashtag To Hash Value: Using The Hash Value Model To Report Child Sex Abuse Material, Jessica Mcgarvie
Seattle Journal of Technology, Environmental & Innovation Law
In the summer of 2021, Apple announced it would release a Child Safety Feature (CSF) aimed at reducing Child Sex Abuse Materials (CSAM) on its platform. The CSF would scan all images a user uploaded to their iCloud for CSAM, and Apple would report an account with 30 or more flagged images to the National Center for Missing and Exploited Children. Despite Apple’s good intentions, they received intense backlash, with many critics arguing the proposed CSF eroded a user’s privacy. This article explores the technology behind Apple’s CSF and compares it to similar features used by other prominent tech companies. …
A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1),
2023
Seattle University School of Law
A New Right Is The Wrong Tactic: Bring Legal Actions Against States For Internet Shutdowns Instead Of Working Towards A Human Right To The Internet (Part 1), Jay Conrad
Seattle Journal of Technology, Environmental & Innovation Law
A New Right is the Wrong Tactic: Bring Legal Actions Against States for Internet Shutdowns Instead of Working Towards a Human Right to the Internet (Part 1) is the first of a two-part series dealing with an increasingly prevalent threat to human rights: State-sanctioned Internet shutdowns. Part 1 details the current tactics and impacts of Internet shutdowns and which human rights are most likely to be violated by or during a shutdown. Part 2 will address the deficiencies of advocating for Internet access to be a recognized human right as a means of combatting shutdowns. Despite the popularity of this …
Texas’ War On Social Media: Censorship Or False Flag,
2023
DePaul University College of Law
Texas’ War On Social Media: Censorship Or False Flag, Leni Morales
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc.,
2023
DePaul University College of Law
Pooling Patents For Pandemic Progress: Mrna Vaccines And The Broader Context Of Modernatx Inc V. Pfizer Inc., Francis Brefo
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution,
2023
DePaul University College of Law
How High Fashion Brands And Nfts Are Changing The Future Of The Art Market And Trademark Prosecution, Grace Hodges
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Aclu V. Clearview Ai, Inc.,,
2023
DePaul University College of Law
Aclu V. Clearview Ai, Inc.,, Isra Ahmed
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022),
2023
DePaul University College of Law
Thaler V. Vidal, 43 F.4th 1207 (Fed. Cir. 2022), Matthew Messina
DePaul Journal of Art, Technology & Intellectual Property Law
No abstract provided.
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy,
2023
University of South Florida
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain,
2023
University of South Florida
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
What Senior U.S. Leaders Say We Should Know About Cyber,
2023
National Defense University, College of Information and Cyberspace
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing,
2023
University College London
Out Of Sight, Out Of Mind? Remote Work And Contractual Distancing, Nicola Countouris, Valerio De Stefano
Articles & Book Chapters
Since the Covid-19 pandemic, remote work has acquired quasi-Marmite status. It has become difficult, if not impossible, to approach the issue in a measured and dispassionate way, which is one of the reasons books such as the present one are being published. Remote work is often seen as anathema by some who associate it with laziness, low productivity and the degradation of the social fabric of firms and of their creative and collaborative potential. The notorious views of CEOs such as Tesla and Twitter’s Elon Musk or JP Morgan’s Jamie Dimon come to mind, indicative – in the view of …
